Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要通读整篇文章,抓住关键信息。 文章主要讲的是Ivanti发布了安全更新,修复了两个影响Ivanti Endpoint Manager Mobile(EPMM)的漏洞。这两个漏洞已经被用于零日攻击,其中一个被CISA加入到了已知被利用的漏洞目录中。 漏洞的严重性很高,CVSS评分都是9.8,属于代码注入,允许攻击者进行未认证的远程代码执行。影响的版本包括EPMM 12.5.0.0及之前版本、12.6.0.0及之前版本、12.7.0.0及之前版本,以及一些其他子版本。修复补丁是RPM 12.x.0.x和RPM 12.x.1.x,但这些补丁在升级版本后不会保留,必须重新应用。永久修复将在2026年第一季度发布的EPMM 12.8.0.0中实现。 文章还提到Ivanti已经注意到有限数量的客户受到了影响,并且没有足够的信息来提供可靠的威胁指标。漏洞影响的是In-House Application Distribution和Android File Transfer Configuration功能,并不涉及其他产品如Ivanti Neurons for MDM等。 此外,文章建议用户检查Apache访问日志以寻找可疑活动,并提供了一些正则表达式模式。还建议审查配置变化、管理员账户、认证设置等,并在发现妥协迹象时采取恢复措施。 最后,CISA要求FCEB机构在2026年2月1日前应用更新。 总结起来,我需要把这些关键点浓缩到100字以内:Ivanti修复了两个高危漏洞CVE-2026-1281和CVE-2026-1340,影响EPMM旧版本,允许远程代码执行;补丁需重新应用;CISA已加入KEV目录;建议用户检查日志和配置,并在必要时恢复设备。 </think> Ivanti修复了两个高危漏洞(CVE-2026-1281和CVE-2026-1340),影响Endpoint Manager Mobile旧版本,允许远程代码执行;补丁需重新应用;CISA已将其加入已知被利用漏洞目录;建议用户检查日志和配置以防止攻击。 2026-1-30 04:43:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Vulnerability / Enterprise Security

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog.

The critical-severity vulnerabilities are listed below -

  • CVE-2026-1281 (CVSS score: 9.8) - A code injection allowing attackers to achieve unauthenticated remote code execution
  • CVE-2026-1340 (CVSS score: 9.8) - A code injection allowing attackers to achieve unauthenticated remote code execution

They affect the following versions -

  • EPMM 12.5.0.0 and prior, 12.6.0.0 and prior, and 12.7.0.0 and prior (Fixed in RPM 12.x.0.x)
  • EPMM 12.5.1.0 and prior and 12.6.1.0 and prior (Fixed in RPM 12.x.1.x)

Cybersecurity

However, it bears noting that the RPM patch does not survive a version upgrade and must be reapplied if the appliance is upgraded to a new version. The vulnerabilities will be permanently addressed in EPMM version 12.8.0.0, which will be released later in Q1 2026.

"We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure," Ivanti said in an advisory, adding it does not have enough information about the threat actor tactics to provide proven, reliable atomic indicators."

The company noted that CVE-2026-1281 and CVE-2026-1340 affect the In-House Application Distribution and the Android File Transfer Configuration features. These shortcomings do not affect other products, including Ivanti Neurons for MDM, Ivanti Endpoint Manager (EPM), or Ivanti Sentry.

In a technical analysis, Ivanti said it has typically seen two forms of persistence based on prior attacks targeting older vulnerabilities in EPMM. This includes deploying web shells and reverse shells for setting up persistence on the compromised appliances.

"Successful exploitation of the EPMM appliance will enable arbitrary code execution on the appliance," Ivanti noted. "Aside from lateral movement to the connected environment, EPMM also contains sensitive information about devices managed by the appliance."

Users are advised to check the Apache access log at "/var/log/httpd/https-access_log" to look for signs of attempted or successful exploitation using the below regular expression (regex) pattern -

^(?!127\.0\.0\.1:\d+
.*$).*?\/mifs\/c\/(aft|app)store\/fob\/.*?404

"Legitimate use of these capabilities will result in 200 HTTP response codes in the Apache Access Log, whereas successful or attempted exploitation will cause 404 HTTP response codes," it explained.

In addition, customers are being asked to review the following to look for any evidence of unauthorized configuration changes -

  • EPMM administrators for new or recently changed administrators
  • Authentication configuration, including SSO and LDAP settings
  • New push applications for mobile devices
  • Configuration changes to applications you push to devices, including in-house applications
  • New or recently modified policies
  • Network configuration changes, including any network configuration or VPN configuration you push to mobile devices

Cybersecurity

In the event signs of compromise are detected, Ivanti is also urging users to restore the EPMM device from a known good backup or build a replacement EPMM and then migrate data to the device. Once the steps are performed, it's essential to make the following changes to secure the environment -

  • Reset the password of any local EPMM accounts
  • Reset the password for the LDAP and/or KDC service accounts that perform lookups
  • Revoke and replace the public certificate used for your EPMM
  • Reset the password for any other internal or external service accounts configured with the EPMM solution

The development has prompted CISA to add CVE-2026-1281 to the KEV catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the updates by February 1, 2026.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/two-ivanti-epmm-zero-day-rce-flaws.html
如有侵权请联系:admin#unsafe.sh