Code Defence Cyber security

Ivanti warns of EPMM RCE vulnerability CVE-2026-6973 under limited exploitation

A high-severity vulnerability in a major mobile device management platform is being targeted in limited, active attacks in the wild. This flaw allows authenticated attackers with administrative access to achieve remote code execution, making the rotation of privileged credentials a critical defensive priority.

Tracked as CVE-2026-6973, the improper input validation flaw impacts @[Ivanti](urn:li:organization:3113) Endpoint Manager Mobile ❨EPMM❩ versions prior to 12.8.0.1. While successful exploitation requires administrative authentication, organizations that failed to rotate credentials following earlier breaches in January 2026 are at significantly higher risk. The flaw allows an adversary to gain full control of the MDM appliance, which can then be used to compromise the entire fleet of managed mobile devices.

The reuse of administrative credentials across vulnerable appliances is a primary driver for these attacks. When an attacker has previously harvested admin rights, a “high-severity” flaw that requires authentication effectively becomes a “critical” unauthenticated path for that specific adversary.

– Upgrade @[Ivanti](urn:li:organization:3113) EPMM to version 12.6.1.1, 12.7.0.1, or 12.8.0.1 immediately to neutralize the RCE path.

– Review all accounts with administrative rights and perform a mandatory password rotation for all MDM service accounts.

– Audit MDM management logs for any anomalous administrative activity or unauthorized device enrollment requests.

– Implement strict network-level isolation for the EPMM appliance and ensure management interfaces are not accessible via public internet.

The security of the mobile enterprise fleet depends on the integrity of the MDM management engine; its compromise is a total-loss event for mobile trust boundaries. #CodeDefence #Ivanti #EPMM #MDM #RCE
/

Scroll to Top