CVE-2026-1281, CVE-2026-1340: Ivanti Endpoint Manager Mobile (EPMM) Zero-Day Vulnerabilities Exploited
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是Ivanti的Endpoint Manager Mobile(EPMM)软件发现了两个严重的远程代码执行漏洞,CVE-2026-1281和CVE-2026-1340,评分都是9.8。这两个漏洞已经被有限地利用了,影响了一些客户。Ivanti已经发布了临时补丁,并计划在2026年第一季度发布永久修复版本。 接下来,我需要把这些信息浓缩到100字以内。要确保包含漏洞名称、评分、影响范围、已发布的补丁以及修复计划。同时,语言要简洁明了,避免使用复杂的术语。 可能的结构是:先点出漏洞及其评分,然后说明被利用的情况,接着提到补丁和修复时间。这样就能在有限的字数内传达所有重要信息。 最后检查一下是否符合要求:没有使用特定的开头词,直接描述内容,并且控制在100字以内。 </think> Ivanti的Endpoint Manager Mobile(EPMM)软件发现两个严重远程代码执行漏洞(CVE-2026-1281和CVE-2026-1340),CVSS评分均为9.8。这些漏洞已被有限利用,影响部分客户。Ivanti已发布临时补丁,并计划于2026年第一季度推出永久修复版本。 2026-1-30 18:42:54 Author: securityboulevard.com(查看原文) 阅读量:0 收藏

Two Critical vulnerabilities in Ivanti’s popular mobile device management solution have been exploited in the wild in limited attacks

Background

On January 29, Ivanti released a security advisory to address two critical severity remote code execution (RCE) vulnerabilities in its Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, a mobile management software used for mobile device management (MDM), mobile application management (MAM) and mobile content management (MCM).

CVE Description CVSSv3
CVE-2026-1281 Ivanti Endpoint Manager Mobile Remote Code Execution Vulnerability 9.8
CVE-2026-1340 Ivanti Endpoint Manager Mobile Remote Code Execution Vulnerability 9.8

Analysis

CVE-2026-1281 and CVE-2026-1340 are both code injection vulnerabilities in Ivanti’s EPMM. An unauthenticated attacker could exploit these vulnerabilities to gain remote code execution.

Limited exploitation observed

According to Ivanti, both CVE-2026-1281 and CVE-2026-1340 were exploited as zero-days affecting “a very limited number of customers.” Because its investigation is ongoing, Ivanti has not yet provided any indicators of compromise in relation to these attacks.

Historical exploitation of Ivanti Endpoint Mobile Manager

Ivanti products in general are a popular target for a variety of attackers. EPMM in particular has been targeted in the past, and the Tenable Research Special Operations (RSO) team has authored several blogs about these vulnerabilities. The following table outlines some of the notable EPMM vulnerabilities over the last six years:

CVE Description Published Tenable Blogs
CVE-2025-4428 Ivanti Endpoint Manager Mobile Remote Code Execution Vulnerability May 2025 CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution
CVE-2025-4427 Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability May 2025 CVE-2025-4427, CVE-2025-4428: Ivanti Endpoint Manager Mobile (EPMM) Remote Code Execution
CVE-2023-35082 Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability August 2025 N/A
CVE-2023-35081 Ivanti Endpoint Manager Mobile Remote Arbitrary File Write Vulnerability July 2025 CVE-2023-35078: Ivanti Endpoint Manager Mobile (EPMM) / MobileIron Core Unauthenticated API Access Vulnerability
CVE-2023-35078 Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability July 2025 CVE-2023-35078: Ivanti Endpoint Manager Mobile (EPMM) / MobileIron Core Unauthenticated API Access Vulnerability
CVE-2020-15505 MobileIron Core & Connector Remote Code Execution Vulnerability October 2020 CVE-2020-1472: Advanced Persistent Threat Actors Use Zerologon Vulnerability In Exploit Chain with Unpatched Vulnerabilities

Proof of concept

At the time this blog was published on January 30, a public proof-of-concept (PoC) exploit was publicly available. We expect attackers will begin to leverage this PoC to conduct mass scanning and exploitation attempts against vulnerable devices.

Solution

Ivanti has released temporary updates that can be applied to address these vulnerabilities. According to the advisory, the RPMs supplied should be applied based on the installed version of EPMM. The RPMs will not survive a version upgrade, so if the version is updated, the RPM would need to be applied once again. However, the advisory further notes that an upcoming release, version 12.8.0.0, is expected to be released in Q1 2026., T and this version will include the permanent fix for these CVEs. Once version 12.8.0.0 is released and applied, the RPM scripts will no longer need to be applied.

Affected Version RPM Patch Version
12.5.0.0 and prior RPM 12.x.0.x
12.5.1.0 and prior RPM 12.x.1.x
12.6.0.0 and prior RPM 12.x.0.x
12.6.1.0 and prior RPM 12.x.1.x
12.7.0.0 and prior RPM 12.x.0.x

For more information on the patches, we strongly recommend reviewing the guidance in the security advisory from Ivanti.

Identifying affected systems

A list of Tenable plugins for these vulnerabilities can be found on the individual CVE pages for CVE-2026-1281 and CVE-2026-1340 as they’re released. This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.

Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Ivanti devices by using the following subscription:

Get more information

Join on Tenable Connect and engage with us in the for further discussions on the latest cyber threats.

Learn more about , the Exposure Management Platform for the modern attack surface.

*** This is a Security Bloggers Network syndicated blog from Tenable Blog authored by Research Special Operations. Read the original post at: https://www.tenable.com/blog/cve-2026-1281-cve-2026-1340-ivanti-endpoint-manager-mobile-epmm-zero-day-vulnerabilities


文章来源: https://securityboulevard.com/2026/01/cve-2026-1281-cve-2026-1340-ivanti-endpoint-manager-mobile-epmm-zero-day-vulnerabilities-exploited/
如有侵权请联系:admin#unsafe.sh