Ivanti warns of exploited EPMM flaw in zero-day attacks

Summary: Ivanti alerted its customers about a high-severity vulnerability in Endpoint Manager Mobile (EPMM), CVE-2026-6973, exploited in zero-day attacks.

Ivanti alerts on new critical EPMM vulnerability exploited as zero-day

The cybersecurity and mobile enterprise management company Ivanti confirmed that a new critical vulnerability in its Endpoint Manager Mobile (EPMM) platform is being actively exploited in zero-day attacks before many organizations have had a chance to apply patches. The warning reignited alarms about the security of MDM (Mobile Device Management) platforms, widely used by companies and governments to manage corporate mobile devices.

The vulnerability specifically affects local (on-premise) instances of Ivanti EPMM and could allow remote attackers to execute arbitrary code without prior authentication, completely compromising the affected server. According to Ivanti, the flaw is already being used in real attacks targeting select organizations.

What is Ivanti EPMM and why does it matter
  • managing corporate smartphones,
  • applying security policies,
  • controlling enterprise applications,
  • managing remote access,
  • protecting Android and iOS devices.

Because these platforms possess high privileges within the corporate infrastructure, compromising an EPMM server can give an attacker critical access to devices, users, and internal resources.

Technical details of the vulnerability

Ivanti indicated that the exploitation involves a chain of vulnerabilities that allows:

  1. unauthenticated remote access,
  2. bypass of security mechanisms,
  3. remote code execution (RCE),
  4. complete system takeover.

The company did not immediately publish all technical details to prevent facilitating massive attacks before organizations apply mitigations. However, it confirmed that external researchers and customers reported malicious activity in real environments. (bleepingcomputer.com)

A concerning pattern at Ivanti

Over recent years, Ivanti has become a frequent target for advanced threat groups due to the high exposure of its VPN, MDM, and enterprise gateway solutions.

Various recent incidents showed campaigns where actors linked to espionage and cybercrime exploited zero-day vulnerabilities in Ivanti products before official patch publication.

This new incident once again highlights:

  • the speed of response to critical vulnerabilities,
  • the complexity of keeping enterprise appliances secure,
  • the importance of continuous monitoring on systems exposed to the internet.
Risks for organizations

A successful exploit could allow for:

  • credential theft,
  • access to corporate mobile devices,
  • lateral movement within the network,
  • malware installation,
  • corporate espionage,
  • ransomware deployment.

In organizations using integrated authentication or centralized administration, the impact could quickly extend to multiple internal systems.

Urgent recommendations

Ivanti recommended immediately applying available security updates and reviewing indicators of compromise published by the company.

Experts also suggest:

  • restricting external access to EPMM servers,
  • enabling advanced log monitoring,
  • reviewing suspicious administrative activity,
  • segmenting MDM servers from the rest of the network,
  • implementing MFA for administrative access,
  • performing forensic analysis if there are signs of compromise.
Growing pressure on enterprise administration platforms

Remote administration and enterprise mobility solutions have become priority targets for attackers due to their privileged access to corporate devices and credentials.

The Ivanti case once again demonstrates how a single vulnerability in critical infrastructure can quickly become an entry point for sophisticated, large-scale attacks.

Original Source:BleepingComputer – Ivanti warns of new EPMM flaw exploited in zero-day attacks

Key facts

  • The CVE-2026-6973 weakness is an Improper Input Validation flaw.
  • It requires administrator privileges for remote exploitation.
  • Mitigation requires installing specific versions of EPMM.
  • It only affects the on-prem EPMM product, not cloud solutions.

Why it matters

Exploitation of this vulnerability could allow attackers to take control of vital enterprise systems, compromising data integrity. Quick action on patching and credential rotation is critical to minimizing the risk of a zero-day attack.

X profile@BleepinComputerhttps://twitter.com/BleepinComputer
Embedded content for: Ivanti warns of exploited EPMM flaw in zero-day attacks