News

CVE-2026-6973: Ivanti EPMM Zero-Day Under Active Exploitation — Patch by May 10

CVE-2026-6973: Ivanti EPMM Zero-Day Under Active Exploitation — Patch by May 10

CVE-2026-6973 is a high-severity improper input validation flaw in Ivanti Endpoint Manager Mobile (EPMM) — the enterprise mobile device management (MDM) platform used by government agencies and large enterprises to manage employee mobile devices. The vulnerability is being actively exploited in the wild: CISA (the U.S. Cybersecurity and Infrastructure Security Agency) added CVE-2026-6973 to its Known Exploited Vulnerabilities (KEV) catalog on May 7, 2026, and issued a four-day remediation deadline requiring U.S. federal civilian agencies to patch by May 10, 2026. Ivanti has released fixes in versions 12.6.1.1, 12.7.0.1, and 12.8.0.1.

CVE-2026-6973: Technical Details

CVE-2026-6973 (documented at the National Vulnerability Database) carries a CVSS v3.1 score of 7.2 (rated High). CVSS v3.1 scores range from 0 to 10, with 7.0–8.9 classified as High severity — meaning this vulnerability poses significant risk but is not rated Critical. In this case, the "High" rather than "Critical" rating reflects the fact that exploitation requires prior authentication with admin-level credentials, which limits exposure compared to unauthenticated flaws.

Ivanti EPMM — formerly branded as MobileIron Core — is the on-premises MDM server organizations use to enroll, configure, and enforce security policies on iOS, Android, and Windows mobile devices at scale. The platform manages device certificates, VPN profiles, Wi-Fi credentials, app distribution, and remote wipe capabilities for enrolled devices.

The vulnerability is classified as CWE-20 Improper Input Validation, a bug class in which software fails to properly sanitize or verify data supplied by a caller before using it in a privileged operation. In Ivanti EPMM's case, a malicious input to an administrative API endpoint bypasses expected validation checks and triggers RCE (Remote Code Execution — the ability to run arbitrary operating-system commands on the server) with the privileges of the EPMM process.

The exploit chain requires the attacker to hold valid administrator credentials on the EPMM instance. While this raises the bar for exploitation, CISA's confirmation of active exploitation means attackers are obtaining those credentials — likely through phishing, credential stuffing against weak or re-used passwords, or leveraging prior account compromise to escalate into EPMM admin accounts.

Ivanti confirmed: "Ivanti is aware of a very limited number of customers exploited with CVE-2026-6973." The company explicitly states the vulnerability only affects on-premises EPMM deployments. Ivanti Neurons for MDM (Ivanti's cloud-based unified endpoint management solution), Ivanti EPM, Ivanti Sentry, and other Ivanti products are not affected.

Exploitation Status and Threat Landscape

The CISA KEV listing is the U.S. government's authoritative confirmation that a vulnerability is being actively weaponized in real-world attacks, not merely theorized about. Inclusion in the KEV catalog triggers Binding Operational Directive (BOD) 22-01, which legally requires Federal Civilian Executive Branch (FCEB) agencies to remediate the vulnerability by the deadline.

The four-day remediation window for CVE-2026-6973 — compared to CISA's standard 21-day deadline for most KEV entries — signals elevated urgency. CISA typically compresses deadlines only when threat intelligence indicates active, ongoing targeting of federal infrastructure.

CVE-2026-6973 follows a troubling pattern of Ivanti EPMM exploitation. In January 2026, Ivanti disclosed CVE-2026-1281 and CVE-2026-1340, two critical-rated (CVSS 9.8) unauthenticated RCE flaws in EPMM that were actively exploited before patches were available. Those vulnerabilities were associated with nation-state activity. In 2023, Norwegian government agencies were among the earliest victims of CVE-2023-35078, another unauthenticated EPMM flaw. The platform has now been exploited in zero-day attacks for three consecutive years, suggesting that sophisticated threat actors are investing sustained research effort into finding new vulnerabilities in it.

No specific threat actor has been publicly attributed for CVE-2026-6973 exploitation at this time. The technical exploitation mechanism has not been fully described in Ivanti's advisory.

Who Is Affected

CVE-2026-6973 affects all on-premises Ivanti EPMM installations running versions prior to the patched releases:

  • All 12.8.x versions before 12.8.0.1
  • All 12.7.x versions before 12.7.0.1
  • All 12.6.x versions before 12.6.1.1
  • Older release trains (12.5.x and earlier) — check the Ivanti May 2026 EPMM Security Update for backport availability

Organizations most at risk include:

  • U.S. federal agencies — mandatory patch by May 10 per BOD 22-01
  • State, local, tribal, and territorial (SLTT) government using EPMM to manage law enforcement or administrative devices
  • Defense contractors managing cleared-personnel mobile devices under DoD mobility policies
  • Healthcare organizations using EPMM to manage clinical or administrative mobile devices
  • Critical infrastructure operators with large EPMM-managed device fleets

Ivanti cloud customers (Ivanti Neurons for MDM) are not affected. No action is required for cloud deployments.

What You Should Do Right Now

  • Verify your EPMM version immediately. Log in to the EPMM admin console, navigate to System > Settings > Version, and note the running version. If it is below 12.6.1.1, 12.7.0.1, or 12.8.0.1 (depending on your release train), you are vulnerable.
  • Apply the patch. Download the applicable fixed version from the Ivanti Product Portal and follow standard EPMM upgrade procedures. U.S. federal agencies must complete this by May 10, 2026.
  • Restrict admin-interface access. If your EPMM admin portal is reachable from the public internet, restrict it to trusted IP ranges via firewall rules immediately — this is the highest-impact workaround if patching cannot be completed before the deadline.
  • Audit EPMM admin accounts. Review all admin-level accounts for unauthorized additions or privilege changes. Disable unused accounts and rotate all active admin credentials.
  • Review API access logs for exploitation indicators. Examine logs for unusual admin API calls, especially from unexpected source IPs or at unusual hours. Treat any anomalous admin activity since May 1 as a potential compromise indicator.
  • Assess downstream device integrity. If the EPMM admin interface was accessed by an unauthorized party, assume enrolled device profiles, pushed certificates, VPN configurations, and email credentials may have been modified or exfiltrated. Audit device enrollment records and issued certificates accordingly.

Background: Understanding the Risk

Ivanti EPMM is not a typical enterprise application — it is the authoritative management plane for an organization's entire managed mobile device fleet. A compromised EPMM admin account effectively hands an attacker control over every enrolled device: the ability to push arbitrary configuration profiles, revoke legitimate certificates, exfiltrate the full enrollment database (containing user mappings, device identifiers, and installed application inventories), or trigger remote wipes.

This is precisely why state-sponsored actors continue to invest in finding EPMM vulnerabilities. Mobile devices used by government personnel carry sensitive communications, access to classified systems via mobile-friendly portals, and location data. The ability to silently modify a managed device's configuration — pushing a new VPN endpoint or Wi-Fi certificate, for example — provides persistent access to network traffic long after the initial compromise is detected.

The CVSS score of 7.2 may create a false sense of security compared to the 9.8-rated flaws from January 2026. That rating captures only the technical characteristics of the vulnerability in isolation; it does not account for the strategic value of the target, the availability of stolen credentials in underground markets, or CISA's confirmation that exploitation is already underway.

Security teams that cannot patch immediately should treat the admin-interface network restriction as a mandatory interim control, not an optional one. Combined with a full admin account audit and credential rotation, these steps eliminate the most plausible exploitation paths while the patch is staged for deployment.

Conclusion

CVE-2026-6973 in Ivanti EPMM (Endpoint Manager Mobile) is under confirmed active exploitation, with CISA imposing an unusually short four-day patch deadline for federal agencies. Patch to 12.6.1.1, 12.7.0.1, or 12.8.0.1 immediately; restrict admin-interface access to trusted networks as an interim control; and audit your admin accounts and API logs for evidence of prior unauthorized access.

For any query contact us at contact@cipherssecurity.com

Leave a Reply

Your email address will not be published. Required fields are marked *