6 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-1281 and CVE-2026-1340 are critical unauthenticated remote code execution vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). The flaws exist in request handling logic exposed over HTTP/HTTPS and allow remote attackers to execute arbitrary code on the EPMM appliance without valid credentials. CVE-2026-1281 is actively exploited in the wild and is listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog, indicating a high risk of real-world attacks against vulnerable deployments.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Unauthenticated Remote Code Execution in Ivanti Endpoint Manager Mobile (EPMM)
CVSS Score: 9.8 (Critical, CVSS v3.1)
Identifier: CVE-2026-1281, CVE-2026-1340
Exploit or POC: CVE-2026-1281 is confirmed to be actively exploited in the wild and is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
Update:
Description:
Mitigation Recommendation:
Treat remediation as urgent due to confirmed in-the-wild exploitation and KEV listing.
Restrict network access to EPMM management and service interfaces to trusted administrative IP ranges only and remove unnecessary internet exposure.
Note: Given the critical severity and confirmed exploitation of this vulnerability, prompt action is essential to secure affected systems. Regularly reviewing and applying security updates is vital to maintaining the integrity and security of your infrastructure.