Open Nav
Sign Up

CVE-2026-6973: Actively Exploited Ivanti EPMM Vulnerability Enables RCE

CVE-2026-6973

Filip Dimitrov

May 8, 2026

Ivanti has released security updates for Ivanti Endpoint Manager Mobile (EPMM) after confirming limited in-the-wild exploitation of CVE-2026-6973, a high-severity remote code execution vulnerability affecting on-premises EPMM deployments.

CVE-2026-6973 is an improper input validation vulnerability that affects Ivanti EPMM versions before 12.6.1.1, 12.7.0.1, and 12.8.0.1. Successful exploitation requires a remotely authenticated user with administrative access, but the risk remains significant because EPMM has been repeatedly targeted in previous campaigns and may hold sensitive access to mobile device management infrastructure.

CISA added CVE-2026-6973 to its Known Exploited Vulnerabilities catalog on May 7, 2026, with a remediation due date of May 10, 2026, for U.S. federal civilian agencies.

Threat Overview

The vulnerability only affects on-premises Ivanti EPMM deployments. Ivanti has stated that Ivanti Neurons for MDM, Ivanti EPM, Ivanti Sentry, and other Ivanti products are not affected.

Although exploitation requires administrator authentication, this does not remove the urgency. Ivanti and government advisories indicate that risk may be higher for organizations previously affected by January 2026 EPMM vulnerabilities, particularly where administrative credentials were not rotated after earlier exploitation activity. The Centre for Cybersecurity Belgium noted that Ivanti has high confidence that credentials used in CVE-2026-6973 exploitation may have originated from prior exploitation of CVE-2026-1340.

Alongside CVE-2026-6973, Ivanti also patched four additional high-severity EPMM vulnerabilities: CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, and CVE-2026-7821. These issues could allow attackers to gain administrative access, impersonate registered Sentry hosts, invoke arbitrary methods, or access restricted information depending on configuration and exposure.

Impact Assessment

Successful exploitation of CVE-2026-6973 could allow an authenticated attacker with administrative access to execute arbitrary code on affected EPMM servers. In practical terms, this may support further compromise of the EPMM appliance, access to sensitive configuration data, disruption of mobile device management operations, or follow-on activity against managed devices and connected enterprise systems.

Organizations should treat this vulnerability as high priority even where there is no current evidence of compromise. 

Recommended Actions

OP Innovate recommends that organizations using Ivanti EPMM take the following actions:

  1. Apply Ivanti’s security updates immediately
    Upgrade affected on-premises EPMM deployments to 12.6.1.1, 12.7.0.1, or 12.8.0.1, depending on the deployed branch.
  2. Review administrative accounts
    Audit all EPMM administrator accounts, remove unnecessary privileges, and rotate credentials, especially if the environment may have been affected by previous Ivanti EPMM vulnerabilities.
  3. Restrict administrative access
    Limit EPMM administrative interfaces to trusted networks, VPN access, or hardened management segments. Avoid exposing administrative services directly to the internet.
  4. Review logs for suspicious activity
    Examine EPMM and web server logs for unusual administrative access, unexpected requests, abnormal authentication patterns, or activity from unfamiliar IP addresses. The originally shared advisory also highlights Apache access logs at /var/log/httpd/https-access_log as a relevant review location.
  5. Hunt for post-exploitation behavior
    Look for signs of new or modified admin accounts, unexpected configuration changes, suspicious certificate activity, unusual device enrollment behavior, web shell indicators, outbound connections, or changes to MDM policies.
  6. Validate exposure externally
    Confirm whether any EPMM services are internet-facing and reduce exposure where possible. Publicly exposed EPMM appliances should be treated as higher risk until patched and reviewed.


Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.