Attackers Deploy Dormant Backdoors in Ivanti EPMM to Bypass Patching of Latest 0-Days
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容和关键点。 文章主要讲的是Ivanti公司的两个零日漏洞被武器化利用的情况。攻击者迅速利用了这两个漏洞,甚至在安全团队发现之前就已经安装了网络外壳。这些漏洞允许攻击者通过bash脚本中的算术扩展绕过身份验证,远程执行代码。 接下来,文章提到Palo Alto Networks的研究人员记录了这些漏洞的大规模利用情况,并指出这些漏洞的CVSS评分很高,意味着攻击者无需任何凭证或用户交互即可控制服务器。攻击者利用了Apache的URL重写功能和bash的特性来执行恶意代码。 此外,文章还提到受影响的行业和国家,以及CISA将其中一个漏洞加入已知被利用的漏洞目录中,要求联邦机构在特定日期前修补漏洞。修复措施包括临时补丁和最终版本的发布建议。 最后,文章强调了组织需要采取的紧急行动,包括应用补丁、恢复系统、更改密码等,并建议采用“假设已被入侵”的心态进行安全防护。 现在,我需要将这些关键点浓缩到100字以内。重点应放在零日漏洞、攻击方式、影响范围、CVSS评分、修复措施以及安全建议上。 </think> Ivanti零日漏洞被快速武器化利用,攻击者通过bash算术扩展绕过身份验证,在服务器上安装网络外壳。该漏洞允许无认证远程代码执行,CVSS评分9.8。研究人员发现大规模 exploitation,并指出修复需立即行动以防止进一步损害。 2026-2-18 07:50:39 Author: thecyberexpress.com(查看原文) 阅读量:3 收藏

Threat actors weaponized two Ivanti zero-days so quickly that security teams discovered web shells already installed on servers—using arithmetic expansion in bash scripts to slip past authentication entirely.

Researchers at Palo Alto Network’s Unit 42 documented widespread exploitation of two Ivanti EPMM vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, which revealed attackers moving from initial reconnaissance to deploying persistent backdoors designed to survive patching cycles.

The critical vulnerabilities affecting Ivanti Endpoint Manager Mobile allow unauthenticated remote code execution through a deceptively simple bash arithmetic expansion trick that transforms mobile device management infrastructure into attacker-controlled command posts.

Palo Alto Networks’ Cortex Xpanse identified over 4,400 EPMM instances exposed on the public internet, representing massive attack surface across state and local government, healthcare, manufacturing, professional services and high-technology sectors in the United States, Germany, Australia and Canada. CISA added CVE-2026-1281 to its Known Exploited Vulnerabilities catalog, signaling the threat’s severity and requiring federal agencies to patch by February 1.

Also read: Ivanti Patches Two Zero-Days in Mobile Manager After Attackers Exploit Vulnerable Systems

Exploitation Chain and Attack Patterns of Ivanti EPMM Bugs

The exploitation leverages legacy bash scripts Apache uses for URL rewriting in EPMM’s In-House Application Distribution and Android File Transfer features. Both vulnerabilities score 9.8 on the CVSS scale, meaning attackers need no credentials, no user interaction and no complex preconditions—just a malicious HTTP GET request to gain complete server control.

The technical mechanics reveal sophisticated abuse of bash’s arithmetic expansion feature. Attackers send HTTP requests to vulnerable endpoints like /mifs/c/appstore/fob/ with specially crafted parameters. The attack manipulates how bash resolves variables during arithmetic operations by setting one parameter to point to another variable name, then embedding malicious commands inside that second variable as an array index.

report-ad-banner

When the vulnerable script attempts arithmetic comparison using the first variable, bash automatically resolves it by looking up the second variable. Inside that variable, attackers nest their payload within array index notation. Bash executes the command while resolving the array, achieving code execution through what appears to be simple variable comparison.

Unit 42 observed multiple attack patterns demonstrating both automated scanning and targeted operations. Reconnaissance attempts used simple sleep commands to verify vulnerability—if servers paused exactly five seconds before returning errors, attackers confirmed they achieved remote code execution and immediately followed up with malicious payloads.

Reverse shell attempts established outbound connections to attacker-controlled servers, with captured traffic showing commands like ncat connecting to IP addresses on ports 443 and 8443. These connections give attackers interactive terminal access to compromised systems, enabling manual exploration and privilege escalation.

Web shell installations proved particularly concerning. Attackers deployed lightweight JSP web shells with innocuous names like 401.jsp, 403.jsp and 1.jsp at the filepath /mi/tomcat/webapps/mifs/. If web servers run as root or Administrator—common in EPMM deployments—attackers gain full administrative control. The web shells enable persistent access that survives reboots and provides backup entry points if other access methods get discovered.

Malware download campaigns demonstrated coordination with broader criminal infrastructure. Some attacks attempted to bypass authentication and immediately download second-stage payloads. One campaign involved installing the Nezha monitoring agent, an open-source server monitoring tool, with special parameters that fetched from Gitee if victims were located in China—maximizing victim reach across geographic boundaries.

Botnet activity emerged as attackers integrated compromised EPMM servers into larger criminal networks. The combination of web shells, reverse shells and monitoring agents suggests attackers aim to transform enterprise mobile management platforms into nodes within distributed attack infrastructure rather than pursuing single-target objectives.

The exploitation timeline reveals threat actors’ acceleration capabilities. Organizations that hadn’t patched within days of disclosure found their systems already compromised with dormant backdoors installed. These backdoors remain hidden until attackers need them, potentially surviving patch deployment if organizations fail to hunt for indicators of compromise before remediation.

Fixes Available

Ivanti released RPM scripts providing temporary mitigation for affected versions. Organizations running versions 12.5.0.x, 12.6.0.x and 12.7.0.x should deploy RPM 12.x.0.x, while those on 12.5.1.0 and 12.6.1.0 require RPM 12.x.1.x. Applying patches requires no downtime and causes no functional impact. However, Ivanti warns that upgrading to new versions requires reinstalling the RPM since patches don’t persist across version changes.

The permanent fix arrives with version 12.8.0.0, scheduled for release later in Q1 2026. Organizations suspecting compromise should not attempt cleaning affected systems. Ivanti recommends either restoring EPMM from known-good backups taken before exploitation or rebuilding appliances and migrating data to replacement systems.

Post-restoration, administrators must reset passwords for local EPMM accounts, LDAP and KDC service accounts, revoke and replace public certificates, and reset passwords for all internal and external service accounts configured with EPMM. The comprehensive password reset reflects how deeply attackers can infiltrate once they achieve initial code execution.

Unit 42 provided XQL queries enabling Cortex XDR customers to hunt for exploitation signs. One query parses EPMM logs for HTTP requests matching exploitation URI parameters, extracting version numbers to help security teams identify vulnerable software. A second query analyzes firewall logs for traffic patterns consistent with exploitation attempts.

Organizations with internet-facing management interfaces must adopt assumed breach mentality, treating these vulnerability disclosures as potential compromise requiring immediate forensic investigation alongside patching efforts.


文章来源: https://thecyberexpress.com/attackers-deploy-backdoors-in-ivanti-epmm/
如有侵权请联系:admin#unsafe.sh