Ivanti EPMM zero-day exploited in limited attacks as admins are urged to patch


Ivanti has released emergency security updates for Endpoint Manager Mobile after confirming limited exploitation of a new zero-day vulnerability. The flaw, tracked as CVE-2026-6973, affects on-premises EPMM deployments and can let a remotely authenticated administrator execute code on vulnerable systems.

The issue is not an unauthenticated bug. Successful exploitation requires administrative access, which makes stolen or previously compromised admin credentials a major concern for affected customers.

Ivanti also patched four other high-severity EPMM vulnerabilities in the same update. The company says it has not seen customer exploitation of those additional flaws at the time of disclosure.

What Ivanti disclosed

CVE-2026-6973 is an improper input validation vulnerability in Ivanti EPMM. It affects versions before 12.6.1.1, 12.7.0.1, and 12.8.0.1.

The vulnerability has a CVSS score of 7.2 and can allow remote code execution when the attacker already has administrative access. That access requirement lowers the scope compared with unauthenticated flaws, but it does not make the issue low risk.

Mobile device management platforms hold sensitive control over enterprise phones, tablets, applications, certificates, and access policies. A compromised EPMM server can give attackers a powerful position inside an organization’s device management infrastructure.

At a glance

ItemDetails
Main vulnerabilityCVE-2026-6973
ProductIvanti Endpoint Manager Mobile
Affected deploymentsOn-premises EPMM only
Fixed versions12.6.1.1, 12.7.0.1, and 12.8.0.1
SeverityHigh, CVSS 7.2
Access requiredRemote authenticated admin access
ImpactRemote code execution
Exploitation statusLimited exploitation observed

Which Ivanti products are affected

The May 2026 update applies to on-premises Ivanti Endpoint Manager Mobile. Ivanti says the issues do not affect Ivanti Neurons for MDM, Ivanti EPM, Ivanti Sentry, or other Ivanti products.

This distinction matters because similarly named Ivanti products can create confusion during patching. Administrators should confirm the exact product and version before deciding whether the advisory applies to their environment.

Organizations running on-premises EPMM should treat the update as urgent. CISA added CVE-2026-6973 to its Known Exploited Vulnerabilities catalog and set a May 10, 2026 remediation deadline for U.S. federal civilian agencies.

Other vulnerabilities patched in the same update

CVESeverityIssue typePotential impact
CVE-2026-69737.2Improper input validationRemote code execution by an authenticated admin user.
CVE-2026-57868.8Improper access controlA remote authenticated attacker could gain administrative access.
CVE-2026-57878.9Improper certificate validationA remote unauthenticated attacker could impersonate registered Sentry hosts and obtain valid client certificates.
CVE-2026-57887.0Improper access controlA remote unauthenticated attacker could invoke arbitrary methods.
CVE-2026-78217.4Improper certificate validationA remote unauthenticated attacker could enroll a restricted unenrolled device and expose appliance information.

Why admin credential review matters

The most important detail is the authentication requirement. CVE-2026-6973 needs admin access, so attackers need valid privileged credentials before they can exploit it.

The Centre for Cybersecurity Belgium said Ivanti has high confidence that administrative credentials used in exploitation came from earlier compromise activity tied to CVE-2026-1340, one of the Ivanti EPMM flaws disclosed in January 2026.

That makes credential rotation a key part of the response. Patching closes the vulnerability, but stolen admin credentials can still create risk if organizations leave them active.

Why EPMM remains a high-value target

Endpoint Manager Mobile sits close to sensitive enterprise workflows. It helps manage mobile devices, applications, configuration profiles, certificates, and access rules.

Attackers have repeatedly targeted Ivanti products because these systems can provide broad administrative reach. A successful compromise may expose device data, internal configuration details, authentication material, or trusted management channels.

This also explains why government agencies and security vendors move quickly when Ivanti vulnerabilities appear in active attacks. Even limited exploitation can become more dangerous after public disclosure.

What administrators should do now

  • Upgrade on-premises EPMM to version 12.6.1.1, 12.7.0.1, or 12.8.0.1.
  • Review all accounts with administrative rights in EPMM.
  • Rotate EPMM admin credentials, especially if the environment was affected by January 2026 EPMM flaws.
  • Check whether any unused or shared administrator accounts still exist.
  • Restrict administrative interfaces to trusted networks only.
  • Review Apache access logs and authentication records for suspicious activity.
  • Monitor for unusual device enrollment, certificate, and administrative actions.
  • Confirm that cloud-based Ivanti Neurons for MDM environments are not treated as affected on-premises EPMM systems.

What security teams should monitor

Security teams should look for unexpected administrative logins, changes to enrollment settings, new certificates, unusual API calls, and activity from unfamiliar IP addresses.

They should also review whether any EPMM administrator accounts received password resets, MFA changes, or privilege changes before the patch. Those events can help reveal whether attackers already had the access needed to exploit CVE-2026-6973.

Organizations that previously investigated CVE-2026-1281 or CVE-2026-1340 should revisit those cases. Older compromise activity may still matter if credentials were not rotated after the January advisory.

Why Ivanti expects more disclosures

Ivanti said it has started using advanced AI and large language models in its product security and engineering red team processes. The company says this helped its teams find vulnerabilities that traditional SAST and DAST tools missed.

The company also said it keeps humans involved to verify automated findings. Ivanti expects this process to increase the number of vulnerabilities it finds, fixes, and discloses.

For customers, that means patch cycles may become more frequent. The practical response is to keep accurate inventories, subscribe to Ivanti security alerts, and test EPMM update procedures before emergency advisories arrive.

FAQ

Does the vulnerability affect Ivanti Neurons for MDM?

No. Ivanti says Ivanti Neurons for MDM, Ivanti EPM, Ivanti Sentry, and other Ivanti products are not affected by these EPMM vulnerabilities.

Which Ivanti EPMM versions fix the issue?

Ivanti lists 12.6.1.1, 12.7.0.1, and 12.8.0.1 as fixed versions for affected on-premises EPMM deployments.

Is CVE-2026-6973 being exploited?

Yes. Ivanti says it has seen very limited exploitation of CVE-2026-6973, and CISA has added it to the Known Exploited Vulnerabilities catalog.

What is CVE-2026-6973?

CVE-2026-6973 is an improper input validation vulnerability in Ivanti Endpoint Manager Mobile that can allow remote code execution by an authenticated administrator.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages