Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

629+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-1340: Ivanti EPMM Code Injection Vulnerability
CVE-2026-1340: Ivanti EPMM Code Injection Vulnerability

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-1340

CVE-2026-1340: Ivanti EPMM Code Injection Vulnerability

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the Android File Transfer module allowing unauthenticated remote code execution. Added to CISA KEV as actively exploited.

Dylan H.

Security Team

April 8, 2026
4 min read

Affected Products

  • Ivanti Endpoint Manager Mobile (EPMM) — all on-premises versions
  • EPMM Android File Transfer module

Executive Summary

CVE-2026-1340 is a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM), specifically within the Android File Transfer module. The flaw allows an unauthenticated remote attacker to inject and execute arbitrary commands on the affected server. CISA added this CVE to its Known Exploited Vulnerabilities (KEV) catalog on April 8, 2026, confirming active exploitation in the wild.

This CVE is closely associated with CVE-2026-1281, another code injection flaw in EPMM's In-House App Distribution component (CVSS 9.8), which was chained with CVE-2026-1340 in attacks against European government agencies including the Dutch Data Protection Authority, the Dutch Council for the Judiciary, the European Commission, and Finland's Valtori state ICT provider.


Vulnerability Details

FieldDetails
CVECVE-2026-1340
SeverityCritical
TypeCode Injection — Remote Code Execution
ComponentEPMM Android File Transfer module
AuthenticationNone required
Attack VectorNetwork
ImpactFull server compromise — arbitrary command execution
CISA KEVAdded April 8, 2026

Technical Root Cause

The vulnerability exploits Bash arithmetic expansion in EPMM's Android File Transfer file delivery mechanism. An unauthenticated attacker can craft a malicious request that causes the server to evaluate attacker-controlled input as a shell expression, resulting in arbitrary OS command execution under the EPMM service account.

This is the same class of vulnerability (Bash arithmetic expansion injection) as CVE-2026-1281, which targets EPMM's In-House App Distribution feature. Together, the two flaws formed a zero-day exploit chain used to breach European government agencies starting January 29, 2026 — before patches were available.


Exploitation Context

Government Breach Campaign

Threat actors exploited this vulnerability (alongside CVE-2026-1281) in a targeted campaign against European governmental organizations:

Victim OrganizationCountryImpact
Dutch Data Protection Authority (AP)NetherlandsSystems compromised
Dutch Council for the JudiciaryNetherlandsCourt infrastructure breached
European CommissionEUInstitutional systems accessed
Valtori (State ICT Provider)FinlandUp to 50,000 gov. employees affected

Sleeper Webshells

Researchers discovered that attackers planted webshells designed for long-term persistent access — disguised as legitimate EPMM system files and dormant until activated by specific request parameters. Organizations that applied patches without conducting forensic investigation may still be compromised.


Affected Systems

Version RangeStatus
EPMM on-premises — all versionsVulnerable
Ivanti Cloud Neurons for MDMNot affected
EPMM 12.8.0.0+ (post-patch)Fixed

Note: Only on-premises EPMM deployments are vulnerable. Cloud-hosted Neurons for MDM is not affected.


Remediation

Immediate Actions

  1. Apply Ivanti's security update — Install the latest patch as directed by Ivanti's advisory
  2. Conduct forensic investigation — Patching alone is insufficient; sleeper webshells may persist
  3. Search for webshells — Audit unexpected files in EPMM web directories
  4. Review authentication logs — Look for unauthenticated access to Android File Transfer endpoints
  5. Rotate all credentials — Change credentials accessible from the EPMM server

Network Hardening

  • Restrict EPMM management interface access to trusted internal networks only
  • Implement WAF rules targeting code injection patterns in EPMM endpoints
  • Monitor for anomalous outbound connections from the EPMM host

CISA Directive

Per CISA's KEV policy, all U.S. federal civilian executive branch (FCEB) agencies are required to remediate this vulnerability by the CISA-specified deadline. Organizations are strongly urged to prioritize patching regardless of sector.


Detection

Look for indicators of exploitation in EPMM logs:

# Suspicious patterns in Android File Transfer endpoint logs:
- Requests with Bash arithmetic syntax: $(command), $((expr))
- Unusual HTTP method combinations on /mifs/afw/ or related paths
- Unexpected outbound network connections from the EPMM host
- New files appearing in EPMM web directories
- Scheduled tasks or cron jobs added post-deployment

Ivanti's Ongoing Vulnerability History

DateProductCVE(s)Status
Jan 2024Connect SecureCVE-2024-21887Mass exploitation
Oct 2024Cloud Service ApplianceCVE-2024-8963Active exploitation
Jan 2026Connect SecureMultipleCISA emergency directive
Feb 2026EPMMCVE-2026-1281 / CVE-2026-1340EU government breaches
Apr 2026EPMMCVE-2026-1340CISA KEV added

References

  • CISA Known Exploited Vulnerabilities Catalog — CVE-2026-1340
  • NVD — CVE-2026-1340
  • Ivanti Security Advisory — EPMM Vulnerabilities
  • The Record — EU and Dutch Government Announce Hacks Following Ivanti Zero-Days
  • Tenable — CVE-2026-1281 / CVE-2026-1340 Ivanti EPMM Zero-Day Analysis
#Ivanti#EPMM#CVE-2026-1340#Code Injection#RCE#CISA KEV#Actively Exploited

Related Articles

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read

CVE-2025-32432: Craft CMS Code Injection Vulnerability

A critical code injection vulnerability in Craft CMS allows unauthenticated remote attackers to execute arbitrary code on affected servers. Added to...

6 min read

CVE-2025-68613: n8n Remote Code Execution via Improper

CISA adds CVE-2025-68613 to the Known Exploited Vulnerabilities catalog — a CVSS 9.9 flaw in n8n's workflow expression evaluation system that enables...

5 min read
Back to all Security Alerts