{"id":2417,"date":"2026-04-09T07:25:35","date_gmt":"2026-04-09T14:25:35","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2417"},"modified":"2026-04-09T07:25:36","modified_gmt":"2026-04-09T14:25:36","slug":"emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/","title":{"rendered":"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What are CVE-2026-1281 and CVE-2026-1340?<\/h2>\n\n\n\n<p>CVE-2026-1281 and CVE-2026-1340 are two code injection vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), an enterprise mobility management platform used to manage and secure mobile device fleets across iOS, Android, and other endpoints. Both flaws reside in server-side Bash scripts invoked by Apache HTTP Server&#8217;s <code>RewriteMap<\/code> feature. Unsafe handling of attacker-controlled input within arithmetic expansion logic allows injected commands to be evaluated and executed by the underlying shell.<\/p>\n\n\n\n<p>The two vulnerabilities carry a CVSS v3.1 base score of 9.8 (Critical). Neither requires authentication, credentials, or user interaction. An attacker with network access to an exposed EPMM instance can exploit either flaw by sending a specially crafted HTTP GET request containing a command substitution payload in the <code>h<\/code> parameter of a known application distribution endpoint.<\/p>\n\n\n\n<p>The two flaws are typically chained: CVE-2026-1281 provides the initial code execution vector via the <code>map-appstore-url<\/code> script, while CVE-2026-1340 affects the adjacent <code>map-aft-store-url<\/code> script. Together, they allow a remote, unauthenticated attacker to achieve arbitrary code execution on the EPMM appliance. Successful exploitation has been observed resulting in web shell deployment, reverse shell establishment, cryptominer installation, secondary payload retrieval, and persistent backdoor installation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-1281 and CVE-2026-1340?<\/h2>\n\n\n\n<p>Both vulnerabilities affect on-premises installations of Ivanti Endpoint Manager Mobile across all supported major version lines through 12.7.x. The cloud-hosted Ivanti Neurons for MDM product is not affected. Ivanti Endpoint Manager (EPM), a separate product, is also not affected. Customers running Ivanti Sentry alongside EPMM should additionally check Sentry-accessible systems for signs of reconnaissance or lateral movement.<\/p>\n\n\n\n<p>Affected assets are typically internet-exposed EPMM appliances deployed at the network perimeter to enable remote mobile device management. Because EPMM must be reachable by managed devices, including those operating outside the corporate network, many installations are intentionally accessible from the public internet. This makes them attractive and reachable targets without any need for an attacker to first penetrate internal network defenses.<\/p>\n\n\n\n<p>Public internet scanning data indicates roughly 1,600 exposed EPMM instances were observable on the internet at the time of disclosure. These appliances hold privileged access to managed mobile devices, including stored personally identifiable information such as names, email addresses, phone numbers, and GPS data, as well as the ability to push configuration and application changes to enrolled endpoints. <\/p>\n\n\n\n<p>This combination of internet exposure and privileged access to device fleets places unpatched EPMM instances among the higher-risk categories of enterprise infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Patches are available. Ivanti released version-specific RPM scripts on January 29, 2026, covering all affected major version lines through 12.7.x. Customers must apply either RPM 12.x.0.x or RPM 12.x.1.x depending on their installed version. Only one RPM is required per installation, and Ivanti has confirmed that applying the patch requires no downtime and has no known feature functionality impact.<\/p>\n\n\n\n<p>One important caveat applies to the RPM patches: they do not survive a version upgrade. If an EPMM appliance is upgraded to a newer version after the RPM has been applied, the RPM must be reinstalled. A permanent fix integrating the remediation into the core product is included in version 12.8.0.0, which Ivanti had been targeting for Q1 2026. Defenders should confirm the availability and release status of 12.8.0.0 directly with Ivanti before treating a version upgrade as equivalent to applying the patch.<\/p>\n\n\n\n<p>Defenders should review their EPMM appliance&#8217;s Apache HTTPD access logs using the vendor-provided regular expression query, available in Ivanti&#8217;s Analysis Guidance advisory, to triage for prior exploitation activity. <\/p>\n\n\n\n<p>Given that active exploitation was confirmed before public disclosure, organizations with internet-exposed EPMM instances should treat any unpatched appliance as potentially compromised and conduct compromise assessment before returning it to normal operation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Apply the appropriate RPM patch immediately, prioritizing any EPMM appliance with an internet-facing administrative interface.<\/li>\n\n\n\n<li>Restrict network access to EPMM management ports where operationally possible, ensuring that only authorized IP ranges can reach the appliance.<\/li>\n\n\n\n<li>Review Apache HTTPD access logs using Ivanti&#8217;s provided detection query for evidence of exploitation against the <code>\/mifs\/c\/appstore\/fob\/<\/code> and AFT store endpoints.<\/li>\n\n\n\n<li>Audit all systems accessible via Sentry for signs of lateral movement, and rotate credentials stored or managed through EPMM in any environment where a compromise cannot be definitively ruled out.<\/li>\n\n\n\n<li>Monitor enrolled mobile devices for unexpected profile changes or application installations following the remediation window.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-1281 &amp; CVE-2026-1340 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two critical pre-authentication code injection flaws in Ivanti EMM, exploited as zero-days since before their disclosure.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2417","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Two critical pre-authentication code injection flaws in Ivanti EMM, exploited as zero-days since before their disclosure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-09T14:25:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T14:25:36+00:00\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection\",\"datePublished\":\"2026-04-09T14:25:35+00:00\",\"dateModified\":\"2026-04-09T14:25:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\"},\"wordCount\":782,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\",\"name\":\"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2026-04-09T14:25:35+00:00\",\"dateModified\":\"2026-04-09T14:25:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection | CyCognito Blog","og_description":"Two critical pre-authentication code injection flaws in Ivanti EMM, exploited as zero-days since before their disclosure.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/","og_site_name":"CyCognito Blog","article_published_time":"2026-04-09T14:25:35+00:00","article_modified_time":"2026-04-09T14:25:36+00:00","author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection","datePublished":"2026-04-09T14:25:35+00:00","dateModified":"2026-04-09T14:25:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/"},"wordCount":782,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/","name":"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2026-04-09T14:25:35+00:00","dateModified":"2026-04-09T14:25:36+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-1281-cve-2026-1340-ivanti-epmm-unauthenticated-rce-via-code-injection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-1281 &amp; CVE-2026-1340) Ivanti EPMM Unauthenticated RCE via Code Injection"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":1,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2417\/revisions"}],"predecessor-version":[{"id":2418,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2417\/revisions\/2418"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}