
[CIVN-2026-0084] Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM)
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM)
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Ivanti Endpoint Manager Mobile (Core) version 11.10.0.4 and prior
Ivanti Endpoint Manager Mobile (Core) version 11.12.0.1 and prior
Ivanti Endpoint Manager Mobile (Core) version 11.2.0.0 and prior
Ivanti Endpoint Manager Mobile (Core) version 11.5.0.0 and prior
Ivanti Endpoint Manager Mobile (Core) version 11.9.1.1 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.0 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.3.0.3 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.4.0.1 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.4.0.3 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.5.0.0 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.5.0.2 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.6.0.0 and prior
Ivanti Endpoint Manager Mobile (Core) version 12.6.0.1 and prior
Ivanti Neurons for ITSM (Cloud) 2025.4.0
Overview
Multiple vulnerabilities have been reported in Ivanti Endpoint Manager Mobile which could allow a remote attacker to execute arbitrary code and gain unauthorized access on the targeted system.
Target Audience:
Individuals and end-user organisations using Ivanti Endpoint Manager Mobile and Ivanti Neurons for ITSM (Cloud).
Risk Assessment:
High risk of sensitive data disclosure and process disruptions.
Impact Assessment:
Potential for system compromise and service disruptions.
Description
Ivanti Endpoint Manager Mobile (Ivanti EPMM) is a Unified Endpoint Management (UEM) solution for securely managing and monitoring mobile devices, applications, and content across different operating systems.
Multiple vulnerabilities have been reported in Ivanti Endpoint Manager due to a code injection flaw.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as released by Ivanti to affected products:
https://hub.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
Vendor Information
Ivanti
https://hub.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
References
Ivanti
https://hub.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US
CVE Name
CVE-2026-1281
CVE-2026-1340
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=7Gtd
—–END PGP SIGNATURE—–


