Executive Summary
CVE-2026-6973 is a high-severity remote code execution vulnerability in Ivanti Endpoint Manager Mobile (EPMM) — formerly known as MobileIron Core. The flaw allows a remotely authenticated user with administrative access to execute arbitrary code on the server. CISA added this vulnerability to the Known Exploited Vulnerabilities (KEV) catalog on May 7, 2026, confirming active exploitation in the wild.
EPMM is widely deployed across government agencies, healthcare organizations, and enterprises to manage mobile devices. The administrative authentication requirement narrows the immediate attack surface but does not prevent exploitation — admin credentials are a routine target in phishing, credential-stuffing, and insider threat scenarios.
Vulnerability Overview
| Attribute | Value |
|---|---|
| CVE ID | CVE-2026-6973 |
| Affected Product | Ivanti Endpoint Manager Mobile (EPMM) |
| Vulnerability Type | Improper Input Validation |
| Attack Vector | Network |
| Authentication Required | Yes — administrative role |
| Impact | Remote Code Execution |
| CISA KEV Added | 2026-05-07 |
| Patch Available | Yes — apply immediately |
Affected Products
| Product | Affected Versions | Remediation |
|---|---|---|
| Ivanti EPMM (MobileIron Core) | All unpatched versions | Apply Ivanti May 2026 security patch |
Technical Analysis
Root Cause
The vulnerability originates from improper input validation in an EPMM API endpoint or backend service accessible to authenticated administrators. An attacker holding valid admin credentials can supply a maliciously crafted input that bypasses server-side validation logic and triggers code execution in the context of the EPMM service account — typically running with elevated OS-level privileges.
While the exact technical specifics have not been publicly disclosed (following coordinated vulnerability disclosure norms), the improper input validation class typically manifests as one of the following patterns:
- Unsanitized command parameters passed to OS-level calls (e.g., shell execution, file operations)
- Deserialisation of untrusted data in administrative workflows
- Path traversal combined with write primitives allowing attacker-controlled file placement and execution
Why Admin Credentials Are Attainable
The authentication requirement does not make this vulnerability low-risk. Administrative EPMM credentials are reachable via multiple attack paths:
1. Credential stuffing — EPMM admin portals often share passwords with AD/LDAP
2. Phishing — IT admin impersonation emails targeting MDM administrators
3. Prior compromise — if any admin workstation is infected, credentials can be harvested
4. Insider threat — disgruntled or coerced staff with admin access
5. Weak/default passwords — especially on trial or legacy deploymentsCISA KEV Addition
CISA's inclusion in the KEV catalog indicates confirmed exploitation by threat actors in real-world attacks — not merely a theoretical proof-of-concept. Federal agencies are required to remediate KEV vulnerabilities within defined timelines under Binding Operational Directive (BOD) 22-01.
Impact Assessment
| Impact Area | Description |
|---|---|
| RCE on EPMM Server | Code execution under service account — typically elevated |
| MDM Infrastructure Access | Full access to device management policies, enrolled devices, and configurations |
| Certificate & Key Exposure | EPMM stores certificates used for device enrollment and app distribution |
| Lateral Movement | EPMM server commonly has broad network access for device communication |
| Data Exfiltration | Device inventory, user identities, app configurations accessible |
| Policy Manipulation | Attacker can push malicious device configurations to managed endpoints |
Immediate Remediation
Step 1: Apply the Ivanti May 2026 Security Patch
Ivanti has released a patch addressing CVE-2026-6973. Apply immediately to all EPMM server instances.
# Verify current EPMM version
cat /etc/mobileiron/version.txt
# Check for available system updates
sudo apt-get update && sudo apt-get upgrade mobileiron-core
# OR follow Ivanti's vendor-specific upgrade process for your deployment typeStep 2: Audit Administrative Accounts
# Review all accounts with EPMM administrative privileges
# Access the EPMM admin console: Admin > User Management > Roles
# Export a list of users with Admin or System Admin role and review for legitimacy
# Check for recently created admin accounts
# Admin > Logs > User Activity > filter by role assignment eventsStep 3: Enable MFA for Admin Console
If multi-factor authentication is not already enforced on the EPMM administrative console, enable it immediately. SAML-based SSO with MFA-enforced identity providers (Entra ID, Okta) significantly reduces the risk of credential-based exploitation.
Step 4: Restrict Admin Console Access
# Restrict EPMM admin portal to known management IP ranges
# In firewall/load balancer, allow only management subnets to reach:
# - EPMM admin UI (port 8443 by default)
# - EPMM API endpoints used by admin workflows
# Block internet-facing access to admin console if not requiredStep 5: Monitor for Exploitation Indicators
# Review EPMM access logs for anomalous admin API calls
tail -f /var/log/mobileiron/server.log | grep -E "(admin|api)" | grep -v "200 OK"
# Look for unexpected processes spawned by EPMM service
ps aux | grep -E "(mobileiron|mics)" | grep -v grepDetection Indicators
| Indicator | Description |
|---|---|
| Unexpected processes spawned under EPMM service account | Active exploitation |
| Admin API calls from unusual IP addresses | Credential compromise or exploitation |
| New administrator account creation at unusual hours | Post-exploitation persistence |
| Device policy changes without change management record | Potential policy manipulation |
| Outbound network connections from EPMM server to non-device IPs | C2 or data exfiltration |
| Modifications to EPMM configuration files by non-Ivanti processes | Post-exploitation |
Post-Remediation Checklist
- Patch — Apply the Ivanti May 2026 security update to all EPMM instances
- Audit admin accounts — Remove stale, excessive, or unrecognized admin accounts
- Enable MFA — Enforce MFA for all administrative console access
- Rotate admin credentials — Change all EPMM admin passwords after patching
- Review enrolled devices — Check for unauthorized device policy changes since the vulnerability disclosure window
- Network segmentation — Ensure EPMM admin console is not internet-accessible without explicit business need
- Threat hunt — Search for indicators of exploitation in EPMM logs from the past 30–60 days
- CISA BOD compliance — Federal agencies must remediate per BOD 22-01 timeline