Key Takeaway
CVE-2026-1281 is a code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows unauthenticated attackers to execute arbitrary code remotely on affected servers. Successful exploitation grants full control of the EPMM instance, exposing MDM credentials, device certificates, and configuration data for managed mobile endpoints. CISA has added this CVE to its Known Exploited Vulnerabilities catalog and requires federal agencies to patch by February 1, 2026.
CVE-2026-1281: Ivanti EPMM Code Injection Flaw Enables Unauthenticated Remote Code Execution
Affected Product: Ivanti Endpoint Manager Mobile (EPMM) Vendor: Ivanti CVE ID: CVE-2026-1281 Vulnerability Type: Code Injection — Unauthenticated Remote Code Execution CISA KEV Patch Deadline: February 1, 2026 (Federal Agencies)
Vulnerability Overview
CVE-2026-1281 is a code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. The flaw allows an unauthenticated remote attacker to execute arbitrary code directly on affected EPMM instances without supplying any valid credentials. Authentication bypass is implicit — an attacker on a network path to the EPMM server can send crafted requests that trigger code execution at the application level.
Ivanti has confirmed the vulnerability and released patches. CISA has added CVE-2026-1281 to its Known Exploited Vulnerabilities (KEV) catalog and mandated that all federal civilian executive branch (FCEB) agencies apply the patch no later than February 1, 2026.
Technical Analysis
The root cause is a code injection flaw within EPMM's server-side processing logic. When EPMM handles specific incoming requests, it fails to properly sanitize or restrict user-supplied input before passing it to an execution context. This allows an attacker to inject malicious code that the server processes and runs with the privileges of the EPMM application process.
Because the vulnerability operates pre-authentication, no account compromise, phishing campaign, or credential theft is required as a precondition. An attacker with network access to the EPMM administrative interface or API endpoint can trigger execution directly.
Ivanti EPMM is an enterprise mobile device management (MDM) platform. Organizations deploy it to manage, configure, and enforce security policy on mobile endpoints across their environment. EPMM instances typically hold mobile device enrollment records, configuration profiles, VPN credentials, Wi-Fi certificates, and email account configurations for the devices they manage. Compromising the EPMM server gives an attacker access to this data and potential lateral movement paths into managed mobile infrastructure.
Real-World Impact
A successful exploit against CVE-2026-1281 gives an attacker arbitrary code execution on the EPMM server. From that position, an attacker can:
- Extract MDM enrollment credentials and device certificates stored on the EPMM instance
- Modify or push malicious configuration profiles to managed mobile devices
- Access stored VPN and Wi-Fi credentials that mobile endpoints use to connect to internal networks
- Pivot from the EPMM server toward internal network segments, as MDM infrastructure typically maintains trust relationships with enterprise systems
- Exfiltrate device inventories, which may include user identities, device hardware details, and OS versions useful for further targeting
Ivanti EPMM has been targeted previously. In 2023, CVE-2023-35078 and CVE-2023-35081 — both affecting EPMM — were actively exploited by a threat actor linked to Norwegian government network intrusions, as documented by CISA and Norway's National Security Authority (NSM). Organizations running Ivanti MDM infrastructure should treat this new vulnerability with the same operational urgency.
Exposure risk increases for organizations that have published their EPMM administrative interface to the internet or have not placed it behind a VPN or zero-trust access gateway. EPMM instances reachable from untrusted networks without network-layer controls are at direct risk of unauthenticated exploitation.
Affected Versions
Organizations should consult Ivanti's official security advisory to confirm the specific EPMM versions affected by CVE-2026-1281. Ivanti publishes version-specific patch guidance through its security portal at https://www.ivanti.com/security.
Patching and Mitigation Guidance
1. Apply Ivanti's Patch Immediately Ivanti has released a security update addressing CVE-2026-1281. All organizations running EPMM must apply the vendor patch without delay. FCEB agencies are under a mandatory CISA deadline of February 1, 2026, but all operators should treat this as critical regardless of regulatory obligation.
2. Isolate EPMM Instances Pending Patching If patching cannot be completed immediately, restrict network access to the EPMM server. Place it behind a firewall or VPN gateway that limits access to known administrative source IPs only. Remove any public internet exposure of the EPMM interface.
3. Audit EPMM Logs for Exploitation Indicators Review EPMM application and access logs for anomalous unauthenticated requests, unexpected process execution, or outbound connections from the EPMM host to unfamiliar destinations. Establish a baseline and look for deviations consistent with post-exploitation activity.
4. Rotate Credentials and Certificates Stored in EPMM If there is any indication the EPMM instance was accessible from untrusted networks before patching, treat all credentials, VPN certificates, and Wi-Fi keys stored within EPMM as potentially compromised. Rotate them proactively.
5. Monitor CISA KEV and Ivanti Advisories CISA's KEV catalog entry for CVE-2026-1281 will be updated as additional exploitation evidence is confirmed. Ivanti's security advisory page should be monitored for any supplemental patches or configuration guidance.
References
- Ivanti Security Advisory: https://www.ivanti.com/security
- CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA BOD 22-01 (Federal Patch Mandate): https://www.cisa.gov/binding-operational-directive-22-01
Original Source
CISA KEV
Related Articles
CVE Pending: Critical Vulnerability in Anthropic's Claude Code Discovered Days After Source Code Leak
Adversa AI discovered a critical vulnerability in Anthropic's Claude Code agentic coding assistant within days of Anthropic accidentally leaking the product's source code. Claude Code operates with elevated system privileges in developer environments, making exploitation potentially severe — including credential theft, CI/CD pipeline manipulation, and lateral movement. Organizations should audit deployments, rotate credentials, and apply patches immediately once Anthropic releases a fix.
CVE-2024-6387: OpenSSH regreSSHion RCE Flaw Exposes Millions of Linux Servers to Unauthenticated Root Access
CVE-2024-6387 (regreSSHion) is a signal handler race condition in OpenSSH sshd versions 8.5p1 through 9.7p1 that allows unauthenticated remote code execution as root. Discovered by Qualys, the flaw affects an estimated 700,000 publicly exposed servers. Administrators should upgrade to OpenSSH 9.8p1 immediately or set LoginGraceTime 0 as a temporary workaround.
CVE-2026-1281: Ivanti EPMM Unauthenticated Code Injection Enables Full System Compromise
CVE-2026-1281 is an unauthenticated code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows remote attackers to execute arbitrary code without credentials, gaining control of the EPMM service and access to all managed mobile devices and enterprise infrastructure. CISA has added the flaw to its Known Exploited Vulnerabilities catalog and mandates federal agency patching by February 1, 2026. Organizations should patch immediately, isolate exposed instances, rotate stored credentials, and audit logs for signs of exploitation.
Apple Expands DarkSword Exploit Kit Mitigations Across Device Fleet After State-Sponsored and Spyware Vendor Abuse
Apple has expanded mitigations against the DarkSword exploit kit to additional devices after the toolkit was used in operations by state-sponsored threat groups and commercial spyware vendors. The expansion follows Apple's standard model of phased protection rollouts across its device ecosystem. All Apple device owners should apply the latest OS updates immediately, and high-risk individuals should enable Lockdown Mode.