Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
- Last update: 05/02/2026
- Affected software: EPMM Endpoint Manager Mobile versions 12.7.0.0, 12.6.0.0, 12.5.0.0, and prior
- Type: Remote Code Execution
- CVE/CVSS
→ CVE-2026-1340: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
→ CVE-2026-1281: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Newly discovered vulnerabilities in Ivanti EPMM Endpoint Manager Mobile allows attackers to execute unauthorized code, potentially exposing sensitive company data and disrupting operations.
EPMM is a Unified Endpoint Management (UEM) platform designed to secure and manage mobile devices, applications, and content.
If exploited, this could lead to data breaches, system compromise, and operational downtime impacting confidentiality, integrity, and availability of critical businesses.
As of 05/02/2026, there is credible information that both vulnerabilities CVE-2026-1281 & CVE-2026-1340 are actively being exploited. This has been confirmed by both Ivanti and CISA. Ivanti has updated their official advisory.
Threat actors have been observed erasing logging data on Ivanti systems and implementing a backdoor in memory. During post exploitation, the threat actors execute commands to collect and exfiltrate data. Please note that patching is not enough, an investigation needs to take place to rule out potential compromise.
Two critical security vulnerabilities, CVE-2026-1281 & CVE-2026-1340 have been identified in Ivanti Endpoint Manager Mobile (EPMM) versions 12.7.0.0, 12.6.0.0, 12.5.0.0, and prior. This flaw arises from code injection, a type of vulnerability that allows attackers to inject and execute malicious code into an application, potentially leading to full system compromise.
In affected versions, an attacker can exploit this vulnerability via the In-House Application Distribution and Android File Transfer Configuration features, leading to unauthenticated remote code execution.
Patch
Additionally, the CCB recommends to:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
HelpNetSecurity - https://www.helpnetsecurity.com/2026/01/30/ivanti-epmm-cve-2026-1281-cve-2026-1340/