[CIVN-2026-0084] Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM)

By Published On: February 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM)


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


Ivanti Endpoint Manager Mobile (Core) version 11.10.0.4 and prior

Ivanti Endpoint Manager Mobile (Core) version 11.12.0.1 and prior

Ivanti Endpoint Manager Mobile (Core) version 11.2.0.0 and prior

Ivanti Endpoint Manager Mobile (Core) version 11.5.0.0 and prior

Ivanti Endpoint Manager Mobile (Core) version 11.9.1.1 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.0 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.3.0.3 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.4.0.1 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.4.0.3 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.5.0.0 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.5.0.2 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.6.0.0 and prior

Ivanti Endpoint Manager Mobile (Core) version 12.6.0.1 and prior

Ivanti Neurons for ITSM (Cloud) 2025.4.0

Overview


Multiple vulnerabilities have been reported in Ivanti Endpoint Manager Mobile which could allow a remote attacker to execute arbitrary code and gain unauthorized access on the targeted system.


Target Audience:

Individuals and end-user organisations using Ivanti Endpoint Manager Mobile and Ivanti Neurons for ITSM (Cloud).


Risk Assessment:

High risk of sensitive data disclosure and process disruptions.


Impact Assessment:

Potential for system compromise and service disruptions.


Description


Ivanti Endpoint Manager Mobile (Ivanti EPMM) is a Unified Endpoint Management (UEM) solution for securely managing and monitoring mobile devices, applications, and content across different operating systems.


Multiple vulnerabilities have been reported in Ivanti Endpoint Manager due to a code injection flaw.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the targeted system.


Solution


Apply appropriate updates as released by Ivanti to affected products:

https://hub.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US



Vendor Information


Ivanti

https://hub.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US


References


Ivanti

https://hub.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US


CVE Name

CVE-2026-1281

CVE-2026-1340




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmPOz4ACgkQ3jCgcSdc

ys84aw/+NJl2b60Kn1FmGCkrQ9sWpubdnwkBrb2CxgTdG1cwSyVMHuJB7/65ekSX

pTAi+Bic85S1VTVQJldhnsVEfC5DpLc3cthAGpteTCW4jLR+4necnDGTp7ZGC5kP

mSbg2ie7RKTemHquWfYDoJ4inizh/810nx7NPejrWIly/RVtkJ1LpbCyQqlXTrJc

HLR9jLO0v2RDH+bfuqwTeh6j5LH1Ci2Y6P+ViNm7u64p7Q6J6wR6h002849cC7u1

h2rL5vBEbuO3KeOQ0w6pS34/Gtzaqh1GEdYb4oBuPTkWdSQKrH+wXaVjzIReSwzx

Zgv1EOI8LEe1GxyD0lNGdnYiBB4eVaB/CjbXSAhvl+aPnATGR4XJIcPTZL4Gjviz

3Khnk+n3IRfqWSprXGcjt46fi1Ij0N7F16DWVSUJQTxwLODnEJWO/ftF2mcpZMPY

WsMxqSDZ17V6uYA+Ma9WhO79mvIrTxMALuRAyYXUMAwF0C4rXTmfGwFk3rnJbz5V

aGUuuNGq1wWmGhtb+MUt4QxNVQJCf9ZiVBdN8MW7YogBVTZUXCQsxuWC2dgfeTRX

6CGgPXBJYu3xUGLkAMX2AdVMzqOqWZeSdol7wBKh4yo3RTOqC1zAM3tGwkMm4sZ/

eZHKGIfBuMG5f06a7PV7hBhRHZgqiGmQ+9gaPwZYygCeVlb/8TE=

=7Gtd

—–END PGP SIGNATURE—–

Share this article