Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

940+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access
NEWS

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti has disclosed a high-severity improper input validation vulnerability in Endpoint Manager Mobile (EPMM) that is being actively exploited in the wild, granting attackers remote code execution with admin-level access.

Dylan H.

News Desk

May 10, 2026
5 min read

Ivanti has disclosed that a newly identified high-severity vulnerability in its Endpoint Manager Mobile (EPMM) platform is being actively exploited in limited attacks. The flaw, tracked as CVE-2026-6973 with a CVSS score of 7.2, is an improper input validation issue that allows remote attackers to execute code with administrative privileges on vulnerable EPMM servers.

The vulnerability was reported by The Hacker News on May 7, 2026, following Ivanti's disclosure to customers.

Vulnerability Details

FieldDetails
CVECVE-2026-6973
CVSS Score7.2 (High)
Vulnerability TypeImproper Input Validation
ImpactRemote Code Execution with Admin-Level Access
Exploitation StatusActively exploited in limited attacks
Affected VersionsEPMM before 12.6.1.1, 12.7.0.1, and 12.8.0

The improper input validation flaw exists in a component of EPMM that processes attacker-controlled input without adequate sanitization. Successful exploitation allows a remote threat actor to inject and execute malicious code on the EPMM server, effectively gaining administrative control over the device management platform.

What Is Ivanti EPMM?

Ivanti Endpoint Manager Mobile — formerly known as MobileIron — is an enterprise mobile device management (MDM) and unified endpoint management (UEM) platform. Organizations use EPMM to:

  • Manage and enroll mobile devices (iOS, Android, Windows)
  • Distribute enterprise applications and configurations
  • Enforce security policies on employee-owned and corporate-issued devices
  • Control access to corporate resources from mobile endpoints

EPMM servers are typically internet-facing, enabling remote devices to check in and receive policy updates. This public exposure makes them high-value targets for threat actors seeking persistent initial access into enterprise networks.

Active Exploitation

Ivanti confirmed that the vulnerability has been exploited in "limited attacks in the wild" at the time of disclosure. This pattern — limited initial exploitation that expands rapidly after public disclosure — has been observed repeatedly with prior Ivanti CVEs. Organizations that do not patch quickly should anticipate broader exploitation as technical details and proof-of-concept code spread.

The admin-level access granted by successful exploitation means attackers can:

  • Modify device enrollment and management policies
  • Push malicious configurations or applications to managed devices
  • Access device inventories including corporate contact data and location information
  • Use the EPMM server as a pivot point to reach internal network resources

Patched Versions

Ivanti has released patched versions addressing CVE-2026-6973:

  • 12.6.1.1 (for the 12.6 branch)
  • 12.7.0.1 (for the 12.7 branch)
  • 12.8.0 (for the 12.8 branch)

Organizations running any version of EPMM prior to these releases should upgrade immediately.

Ivanti's Track Record of Exploitation

CVE-2026-6973 continues a troubling pattern of critical vulnerabilities in Ivanti products being exploited before or shortly after disclosure:

YearCVEProductNotes
2023CVE-2023-35078EPMMAuth bypass, nation-state exploitation
2024CVE-2024-21887Connect SecureMass exploitation by China-nexus APT
2025CVE-2025-0282Connect SecureZero-day, CISA emergency directive
2026CVE-2026-6973EPMMThis incident, active exploitation confirmed

This pattern has prompted CISA to issue multiple emergency directives ordering federal agencies to patch Ivanti products on accelerated timelines. Organizations should treat Ivanti zero-days as near-certain to be actively exploited and plan accordingly.

Immediate Response Steps

Patch Now

  1. Upgrade EPMM to version 12.6.1.1, 12.7.0.1, or 12.8.0 depending on your current branch
  2. Apply any interim mitigations published by Ivanti if a patch cannot be applied immediately
  3. Restrict internet-facing access to EPMM where operationally feasible — IP allowlisting, firewall rules, or placement behind a zero-trust gateway

Investigate for Compromise

  1. Review EPMM access logs for unusual authentication activity, API calls, or configuration changes dating back to at least April 2026
  2. Check administrative accounts for unauthorized additions or privilege changes
  3. Audit enrolled device policies for unexpected configurations or application distributions
  4. Monitor for lateral movement from the EPMM server into adjacent network segments

Notify and Remediate

  1. If compromise is suspected, engage your incident response team and follow your organization's breach notification obligations
  2. Reset all EPMM administrative credentials as a precautionary measure
  3. Consider forensic preservation of EPMM logs before upgrading if compromise is suspected, to support post-incident investigation

CISA and Federal Implications

Given Ivanti's history, CVE-2026-6973 is likely to be added to CISA's Known Exploited Vulnerabilities (KEV) catalog with a short federal remediation deadline. Federal agencies and critical infrastructure operators subject to CISA Binding Operational Directives should prepare for an accelerated patching mandate.

Recommendations

Ivanti products have demonstrated consistent vulnerability to zero-day and near-zero-day exploitation. Organizations relying on EPMM or other Ivanti products should:

  • Establish a dedicated Ivanti patching lane with shortened SLAs — do not treat these as routine monthly patch items
  • Place EPMM behind network controls that limit the exposure surface
  • Evaluate whether the operational benefits of internet-facing MDM justify the sustained risk
  • Consider continuous monitoring of Ivanti's security advisory feed as a standing operational requirement

Bottom Line: CVE-2026-6973 follows the established Ivanti pattern exactly — actively exploited before broad disclosure, high-impact admin access, and internet-facing attack surface. Patch immediately and investigate your EPMM logs for signs of prior exploitation.

#Vulnerability#CVE#Ivanti#EPMM#RCE#Zero-Day#Mobile Security#The Hacker News

Related Articles

PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

Palo Alto Networks has disclosed that CVE-2026-0300, a critical CVSS 9.3 buffer overflow in the PAN-OS User-ID Authentication service, is being actively exploited to gain root-level remote code execution on network firewalls in what appear to be espionage-motivated campaigns.

5 min read

Ivanti Customers Confront Yet Another Actively Exploited Zero-Day in EPMM

Attackers are actively exploiting a new zero-day vulnerability in Ivanti Endpoint Manager Mobile (EPMM), the latest in a long series of critical flaws...

5 min read

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

A critical CVSS 9.8 command injection vulnerability in the SGLang AI inference framework allows attackers to achieve remote code execution by supplying a...

4 min read
Back to all News