Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks

0
High
Exploit
Published: Fri May 08 2026 (05/08/2026, 05:41:30 UTC)
Source: SecurityWeek

Description

CVE-2026-6973 is a high-severity vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows an attacker with admin privileges to execute arbitrary code remotely. This zero-day flaw was actively exploited in targeted attacks against a very limited number of customers. The vulnerability involves improper input validation and may have been chained with other Ivanti vulnerabilities (CVE-2026-1281 and CVE-2026-1340) that allow unauthenticated remote code execution, potentially enabling full compromise of the MDM infrastructure. Ivanti released security updates in May 2026 to address this and four other vulnerabilities. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-6973 to its Known Exploited Vulnerabilities catalog, instructing federal agencies to remediate promptly. Customers who rotated credentials following earlier Ivanti advisories have a significantly reduced risk of exploitation. No additional details on the attacks have been publicly disclosed, and other patched vulnerabilities do not appear to have been exploited in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/08/2026, 05:51:32 UTC

Technical Analysis

CVE-2026-6973 is an improper input validation vulnerability in Ivanti EPMM that allows remote code execution by an attacker with administrative privileges. It was exploited in targeted attacks against a very limited set of customers. The vulnerability may have been chained with two other Ivanti zero-day vulnerabilities (CVE-2026-1281 and CVE-2026-1340) that permit unauthenticated remote code execution, facilitating full control over the mobile device management infrastructure. Ivanti issued patches in May 2026 to fix this zero-day and four additional vulnerabilities affecting privilege escalation, certificate theft, arbitrary method invocation, and information disclosure. CISA has mandated remediation for federal agencies by May 10, 2026. Ivanti recommends credential rotation to mitigate risk, especially if previously impacted by related vulnerabilities. No further exploitation details or attack vectors have been publicly shared.

Potential Impact

The vulnerability enables an attacker with administrative privileges to execute arbitrary code remotely on the Ivanti EPMM platform, potentially leading to full compromise of the mobile device management infrastructure. Exploitation was observed in targeted attacks against a very limited number of customers. The chaining of this vulnerability with others that allow unauthenticated remote code execution increases the risk of complete system takeover. The impact includes unauthorized code execution, privilege escalation, and potential loss of control over managed devices. The vulnerability is considered high severity due to the level of access required and the potential consequences.

Mitigation Recommendations

Ivanti has released official security updates addressing CVE-2026-6973 and four other vulnerabilities in the EPMM product. Customers should apply these patches immediately. Ivanti also recommends rotating credentials if not already done following previous advisories related to CVE-2026-1281 and CVE-2026-1340, as this significantly reduces exploitation risk. CISA has included this vulnerability in its Known Exploited Vulnerabilities catalog and requires federal agencies to remediate by May 10, 2026. No additional mitigation steps are indicated by the vendor at this time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks/","fetched":true,"fetchedAt":"2026-05-08T05:51:23.052Z","wordCount":975}

Threat ID: 69fd79dbcbff5d86109b7412

Added to database: 5/8/2026, 5:51:23 AM

Last enriched: 5/8/2026, 5:51:32 AM

Last updated: 5/8/2026, 4:58:32 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses