Open Nav
Sign Up

Ivanti EPMM Unauthenticated RCE Actively Exploited (CVE-2026-1340)

CVE-2026-1340

Filip Dimitrov

April 9, 2026

CVE-2026-1340 is a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that enables unauthenticated remote code execution (RCE). The flaw has been confirmed as actively exploited and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, indicating immediate risk to exposed systems.

The vulnerability is particularly dangerous due to its network exposure and lack of authentication requirements, making any internet-facing EPMM instance a viable target.

For full details, please read the advisory from Ivanti.

Affected Versions

The vulnerability impacts multiple EPMM versions across supported branches:

  • 12.5.0.0 and prior
  • 12.5.1.0 and prior
  • 12.6.0.0 and prior
  • 12.6.1.0 and prior
  • 12.7.0.0 and prior

Ivanti has released patched versions under updated RPM builds (12.x.0.x / 12.x.1.x).

Observed Threat Activity

Ivanti confirmed that exploitation occurred in the wild prior to public disclosure, affecting a limited number of customers.

Shortly after disclosure, a public proof-of-concept (PoC) was released, significantly increasing the likelihood of broader exploitation. The inclusion in CISA’s KEV catalog and the mandated remediation timeline further indicate that this vulnerability is already being operationalized by threat actors.

Technical Details

The flaw allows attackers to inject and execute arbitrary code on vulnerable EPMM servers without authentication. This provides immediate control over the system and removes traditional access barriers.

Given the role of EPMM as a mobile device management platform, successful exploitation can lead to:

  • Full takeover of the EPMM server
  • Access to managed devices and enterprise configurations
  • Credential exposure and identity-based pivoting

Ivanti released an RPM-based detection tool to identify known indicators of compromise. However, this tool is limited to known patterns and cannot confirm the absence of compromise, requiring additional log analysis and validation.

Impact Assessment

This vulnerability should be treated as critical and potentially pre-compromise if the system was exposed.

EPMM sits in a privileged position within enterprise environments, managing devices, policies, and access. As a result, compromise can extend beyond a single system and enable attackers to move laterally, maintain persistence, and target identity infrastructure.

Recommended Actions

Immediate action:

  • Patch all affected EPMM instances immediately
  • Prioritize internet-facing deployments

Validation:

  • Run Ivanti’s RPM detection tool (available here)
  • Review historical logs for suspicious activity prior to patching

Key focus areas during investigation:

  • Unexpected command execution on EPMM hosts
  • Anomalous administrative activity
  • Suspicious outbound connections or lateral movement indicators


Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.