CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Critical Vulnerabilities in Ivanti EPMM Exploited

Palo Alto Unit 42 Archived Mar 16, 2026 ✓ Full text saved

We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. The post Critical Vulnerabilities in Ivanti EPMM Exploited appeared first on Unit 42 .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Executive Summary Two critical zero-day vulnerabilities (CVE-2026-1281 and CVE-2026-1340) affecting Ivanti Endpoint Manager Mobile (EPMM) are being actively exploited in the wild, affecting enterprise mobile fleets and corporate networks. These vulnerabilities allow unauthenticated attackers to remotely execute arbitrary code on target servers, granting them full control over mobile device management (MDM) infrastructure without requiring user interaction or credentials. Unit 42 has observed widespread exploitation of these vulnerabilities, including: Establishing a reverse shell Installing web shells Conducting reconnaissance Downloading malware This campaign also affected the following sectors in the United States, Germany, Australia and Canada: State and local government Healthcare Manufacturing Professional and legal services High technology Due to the severity of the threat, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-1281 to its Known Exploited Vulnerabilities (KEV) Catalog. Threat actors are accelerating operations, moving from initial reconnaissance to deploying dormant backdoors designed to maintain long-term access even after organizations apply patches. Palo Alto Networks Cortex Xpanse has identified the presence of over 4,400 EPMM instances in our telemetry. Palo Alto Networks customers are better protected from CVE-2026-1281 and CVE-2026-1340 through the following products: Advanced URL Filtering and Advanced DNS Security Cortex Xpanse Next-Generation Firewall with the Advanced Threat Prevention security subscription Palo Alto Networks also recommends referring to Ivanti’s security advisory, released in January 2026. Ivanti recommends in their security advisory to apply either RPM 12.x.0.x or RPM 12.x.1.x, depending on their version. The RPMs are version-specific, not vulnerability-specific. No downtime is required to apply the patch, and Ivanti is not aware of any feature functionality impact with this patch. More details can be found in the Interim Guidance section. The Unit 42 Incident Response team can also be engaged to help with a compromise or to provide a proactive assessment to lower your risk. Related Unit 42 Topics CVE-2026-1281, CVE-2026-1340 Details of CVE-2026-1281 CVE-2026-1281 (CVSS 9.8) is a critical remote code execution (RCE) vulnerability in Ivanti EPMM. The vulnerability lies in legacy bash scripts used by the Apache web server to handle URL rewriting. The vulnerable component in Ivanti EPMM uses Apache RewriteMap configurations that point to bash scripts located at /mi/bin/map-appstore-url. These scripts are designed to process URLs for the In-House Application Distribution feature. The flaw is a specific type of code injection that uses bash arithmetic expansion. The exploitation process works by tricking the bash script into evaluating a variable that contains a malicious command. This process consists of the following phases: Input manipulation: The attacker sends an HTTP GET request to an endpoint like /mifs/c/appstore/fob/.... Variable pointing: The attacker sets the st parameter to the string theValue (padded with spaces to meet length requirements). The script assigns this input to a variable named gStartTime. Payload injection: The attacker sets the h parameter to include the malicious command wrapped in an array index, such as gPath['sleep 5']. The script assigns this to the variable theValue. Execution: The script attempts to compare gStartTime (which is now the string theValue) against the current time using an arithmetic evaluation (if [[ ${theCurrentTimeSeconds} -gt ${gStartTime} ]]). Expansion: Because gStartTime points to theValue, bash resolves theValue. Inside theValue, the attacker has embedded a command substitution (the array index). Bash executes the command (e.g., sleep 5 or a reverse shell) while resolving the array index. Details of CVE-2026-1340 CVE-2026-1340 (CVSS 9.8) impacts the Ivanti Android File Transfer mechanism. Although the root cause (unsafe bash script usage) is the same as CVE-2026-12821, they reside in two distinct scripts (map-appstore-url vs. map-aft-store-url) handling different features. This vulnerability is triggered via HTTP GET requests to endpoints beginning with /mifs/c/aftstore/fob/. Current Scope of the Exploitation Unit 42 has observed widespread and mostly automated exploitation attempts of CVE-2026-1281 and CVE-2026-1340. We have seen the following command to target vulnerable Ivanti EPMM servers via the following URL pattern shown below in Figure 1. Figure 1. Format of command targeting vulnerable Ivanti EPMM servers. Malware Download In some instances, attackers attempted to bypass authentication on Ivanti's MobileIron platform and immediately download and run a second-stage payload (the /slt script). This second stage typically installs a web shell, a cryptominer or a persistent backdoor to grant the attacker control of the appliance. Figure 2 below shows an example of the URL and subsequent commands seen during an attempt. Figure 2. URL and commands from an exploitation attempt. Botnet Activity We observed attackers downloading a Nezha monitoring agent, an open-source server monitoring utility. They downloaded this tool with specific parameters to fetch from Gitee if the victim’s location is China, ensuring the largest possible victim base irrespective of location. Figure 3 below shows the command to download the Nezha agent. Figure 3. Attempt to download a Nezha monitoring agent. Reverse Shell Attempts In many cases, we observed attempts to execute reverse shells by injecting commands establishing outbound connections to a listening post. Figure 4 below shows examples of these attempts. Figure 4. Attempts to execute reverse shells. Reconnaissance We also observed attackers issue sleep commands in attempts to determine whether the server targeted was vulnerable to exploitation. This is a simple method of testing if the server will pause for five seconds. If the connection hangs for exactly five seconds before returning an error (e.g., a 404 error), the attacker knows they have achieved RCE and will follow up immediately with malicious payloads. Figure 5 shows examples of commands for the reconnaissance attempts. Figure 5. Attempts at reconnaissance. Web Shell Activity We observed threat actors attempt to install a lightweight JSP web shell with names like 401.jsp, 403.jsp and 1.jsp at filepath /mi/tomcat/webapps/mifs/ across various intended targets. In these cases, if the web server is running as root or Administrator, the attacker would gain administrative control of the server. Figure 6 below shows an example of these JSP web shells. Figure 6. Example of a decoded JSP web shell. Interim Guidance for CVE-2026-1281 and CVE-2026-1340 A January 2026 Ivanti security advisory recommends their customers apply either RPM 12.x.0.x or RPM 12.x.1.x, depending on their version. Customers do not need to apply both RPMs as they are version-specific, not vulnerability-specific. No downtime is required to apply this patch, and the company is not aware of any feature functionality impact with this patch. Ivanti’s recommendation remains the same: Customers who have not yet patched should do so immediately, and then review their appliance for any signs of exploitation that may have occurred prior to patching. Applying the patch is the most effective way to prevent exploitation, regardless of how IOCs change over time, especially once a POC is available. The patch requires no downtime and takes only seconds to apply. Ivanti has provided customers with high‑fidelity indicators of compromise, technical analysis at disclosure, and an Exploitation Detection script developed with NCSC‑NL, and continues to support customers as they respond to this threat. Unit 42 Managed Threat Hunting Queries The Unit 42 Managed Threat Hunting team continues to track any attempts to exploit these CVEs across our customers, using Cortex XDR and the XQL queries below. Cortex XDR customers can also use these XQL queries to search for signs of exploitation. If Ivanti EPMM logs are being ingested into Cortex XDR or XSIAM, the following query can be used to identify signs of exploitation. To do so, the dataset name will need to be specified within the dataset stage. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 //Description: This query identifies HTTP(S) requests logged within Ivanti EPMM (Formerly MobileIron) logs that match exploitation URI parameters. The EPMM Version number is also extracted (as EPMM_Version) to provide additional context for security teams to identify if their software version is vulnerable.   config case_sensitive = false   //Note: Replace <ENTER_DATASET_NAME_FOR_IVANTI_EPMM> with the actual name of your Ivanti EPMM syslog dataset.     | dataset = <ENTER_DATASET_NAME_FOR_IVANTI_EPMM>   | fields _time, _raw_log, _reporting_device_ip, _broker_hostname   | alter log_type = arrayindex(regextract(_raw_log, "^[^\+]+\+\d{2}:\d{2}\s[^\s]+\s([^\s]+)\s"),0)   | filter log_type in ("https_request", "https_access", "http_request", "https_access")   | alter EPMM_Version = arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=([^,]+)"),0),   HTTP_Request_src_ip = if(log_type in ("https_request", "http_request"), arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=(?:[^,]+),[^\s]+\s([^\s]+)"), 0), arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=(?:[^,]+),([^:]+)"), 0)),   HTTP_Method = arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=(?:[^\"]*\")(GET|POST|PUT)"), 0),   HTTP_Request_URI = arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=(?:[^\"]*\")(?:GET|POST|PUT)\s+([^\"]+)"), 0),   HTTP_response_Code = arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=(?:[^\"]*\")(?:GET|POST|PUT)\s+(?:[^\"]+)\"\s+([1-5]\d\d)"), 0),   Attempted_command_execution = arrayindex(regextract(_raw_log, "^(?:[^P]*P)+RODUCT=(?:[^\"]*\")(?:GET|POST|PUT)\s+(?:[^=]*=)+gPath([^\s]+)"), 0)   | filter HTTP_Request_URI ~= "\/mifs\/c\/(?:app|aft)store\/fob" AND HTTP_Request_URI ~= "\=gPath"   | fields _time, log_type, EPMM_Version, HTTP_Request_src_ip, HTTP_Method, HTTP_Request_URI, HTTP_response_Code, Attempted_command_execution   | sort asc _time 1 2 3 4 5 6 7 8 9 10 11 // Description: This query identifies HTTP(S) requests logged by NGFW that match Ivanti EPMM exploitation URI parameters.   ​​config case_sensitive = false   | dataset = panw_ngfw_url_raw   | filter uri ~= "\/mifs\/c\/(?:app|aft)store\/fob" and uri ~= "\=gPath"   | fields _time, app, app_category, action, source_ip, dest_ip, dest_port, url_domain, uri, file_url, http_method, http_headers, action, session_id, from_zone, to_zone   | sort asc _time Conclusion The rapid weaponization of these vulnerabilities demonstrates that the window between disclosure and mass exploitation has effectively collapsed, with opportunistic attackers integrating new CVEs into automated scanning frameworks within hours. While these types of attacks lack precision, successfully compromising unpatched edge devices at scale makes them high-risk assets unsecured by patching cycles alone. Organizations with internet-facing management interfaces should adopt an assumed breach mentality and treat detection of any indicators as potential compromise with possible deeper persistence and lateral movement. Palo Alto Networks has shared our findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance. Palo Alto Networks customers are better protected by our products, as listed below. We will update this threat brief as more relevant information becomes available. Palo Alto Networks Product Protections for CVE-2026-1281 and CVE-2026-1340 Palo Alto Networks customers can leverage a variety of product protections and updates to identify and defend against this threat. Next-Generation Firewalls With Advanced Threat Prevention Next-Generation Firewall with the Advanced Threat Prevention security subscription can help block the attacks via the following Threat Prevention signature: 96919. Cloud-Delivered Security Services for the Next-Generation Firewall Advanced URL Filtering and Advanced DNS Security identify known domains and URLs associated with this activity as malicious. Cortex Xpanse Cortex Xpanse has the ability to identify exposed Ivanti EPMM devices on the public internet and escalate these findings to defenders. Customers can enable alerting on this risk by ensuring that they’ve enabled the Ivanti Endpoint Manager Mobile (MobileIron Core) Attack Surface Rule. Identified findings can be viewed in the incident view of Expander. These findings are also available for Cortex XSIAM customers who have purchased the ASM module. Cortex Cloud While there are no known indications of the exploitation of this vulnerability within cloud infrastructure, Cortex Cloud customers are better protected from, and can detect and remediate, vulnerable cloud infrastructure by using Cortex Cloud’s vulnerability monitoring. Additionally, the proper placement of Cortex Cloud XDR endpoint agent and serverless agents within a cloud environment helps detect and prevent the malicious operations, configuration alterations or exploitations at runtime providing sustained defenses of the cloud environment. If you think you might have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call: North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42) UK: +44.20.3743.3660 Europe and Middle East: +31.20.299.3130 Asia: +65.6983.8730 Japan: +81.50.1790.0200 Australia: +61.2.4062.7950 India: 000 800 050 45107 South Korea: +82.080.467.8774 Indicators of Compromise 23[.]227[.]199[.]80 (Port 443) 64[.]7[.]199[.]177 (Ports 10882, 18899) 83[.]138[.]53[.]139 84[.]72[.]235[.]18 (Port 443) 86[.]106[.]143[.]200 (Port 443) 91[.]193[.]19[.]12 (Port 443) 107[.]173[.]231[.]201 (Port 6666) 130[.]94[.]41[.]206 (Ports 8082, 10808) 138[.]226[.]247[.]241 144[.]172[.]106[.]4 146[.]70[.]41[.]193 (Port 443) 152[.]32[.]173[.]138 158[.]247[.]199[.]185 (Port 80) 185[.]173[.]235[.]232 192[.]242[.]184[.]234 193[.]242[.]184[.]234 (Port 443) 194[.]78[.]67[.]253 (Port 443) 198[.]13[.]158[.]58 (Port 8443) 204[.]251[.]198[.]205 (Port 443) [subdomain].gobygo[.]net [subdomain].introo[.]sh [subdomain].ngrok-free[.]app [subdomain].main[.]interacth3[.]io [subdomain].ddns[.]1433[.]eu[.]org [subdomain].oast[.]live [subdomain].oast[.]me [subdomain].oast[.]site [subdomain].eyes[.]sh [subdomain].requestrepo[.]com [subdomain].ceye[.]io interact[.].gateway[.]horizon3ai[.]com hxxp://152[.]32[.]173[.]138/U26d86f1899513347.5b5b0c1b hxxp://64[.]7[.]199[.]177:18899 zeetcckhtudizieudqyck5o4ez16y973h[.]oast[.]fun/ hxxp://152[.]32[.]173[.]138/U5213b63dda61af48.0F3Ab3D3 hxps://e598292a5fbd[.]ngrok-free[.]app/ /mi/tomcat/webapps/mifs/401.jsp /mi/tomcat/webapps/mifs/403.jsp /mi/tomcat/webapps/mifs/1.jsp agent[.]sh /mi/tomcat/webapps/mifs/css/test.css /mi/tomcat/webapps/mifs/css/poc.css /mi/tomcat/webapps/mifs/css/cssaaa.css /mi/tomcat/webapps/mifs/css/login.css Updated Feb. 23, 2026 at 9:45 a.m. PT to update Indicators of Compromise section. Updated Feb. 23, 2026 at 11:56 a.m. PT to update Indicators of Compromise section and update Figure 2. Back to top TAGS CVE-2026-1281 CVE-2026-1340 Ivanti Remote Code Execution Reverse shells Threat Research Center Next: Phishing on the Edge of the Web and Mobile Using QR Codes TABLE OF CONTENTS Executive Summary Details of CVE-2026-1281 Details of CVE-2026-1340 Current Scope of the Exploitation Malware Download Botnet Activity Reverse Shell Attempts Reconnaissance Web Shell Activity Interim Guidance for CVE-2026-1281 and CVE-2026-1340 Unit 42 Managed Threat Hunting Queries Conclusion Palo Alto Networks Product Protections for CVE-2026-1281 and CVE-2026-1340 Next-Generation Firewalls With Advanced Threat Prevention Cloud-Delivered Security Services for the Next-Generation Firewall Cortex Xpanse Cortex Cloud Indicators of Compromise RELATED ARTICLES VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) Exploitation of Critical Vulnerability in React Server Components (Updated December 12) Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild (Updated November 3) Related Vulnerabilities Resources THREAT RESEARCH November 7, 2025 LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices Android Apple CVE-2025-21042 Read now HIGH PROFILE THREATS November 3, 2025 Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild (Updated November 3) CVE-2025-59287 Microsoft Microsoft Vulnerability Read now THREAT RESEARCH October 31, 2025 When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems GenAI Google LLM Read now HIGH PROFILE THREATS February 19, 2026 VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) Bash CVE-2026-1731 PowerShell Read now THREAT RESEARCH January 30, 2026 Privileged File System Vulnerability Present in a SCADA System CVE-2025-0921 Privilege escalation SCADA Read now HIGH PROFILE THREATS January 13, 2026 Threat Brief: MongoDB Vulnerability (CVE-2025-14847) CVE-2025-14847 MongoDB Read now THREAT RESEARCH January 13, 2026 Remote Code Execution With Modern AI/ML Formats and Libraries Apple CVE-2025-23304 CVE-2026-22584 Read now HIGH PROFILE THREATS December 12, 2025 Exploitation of Critical Vulnerability in React Server Components (Updated December 12) Cobalt Strike CVE-2025-55182 CVE-2025-66478 Read now THREAT RESEARCH November 10, 2025 You Thought It Was Over? Authentication Coercion Keeps Evolving Mimikatz PrintNightmare Privilege escalation Read now THREAT RESEARCH November 7, 2025 LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices Android Apple CVE-2025-21042 Read now HIGH PROFILE THREATS November 3, 2025 Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild (Updated November 3) CVE-2025-59287 Microsoft Microsoft Vulnerability Read now THREAT RESEARCH October 31, 2025 When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems GenAI Google LLM Read now HIGH PROFILE THREATS February 19, 2026 VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) Bash CVE-2026-1731 PowerShell Read now THREAT RESEARCH January 30, 2026 Privileged File System Vulnerability Present in a SCADA System CVE-2025-0921 Privilege escalation SCADA Read now HIGH PROFILE THREATS January 13, 2026 Threat Brief: MongoDB Vulnerability (CVE-2025-14847) CVE-2025-14847 MongoDB Read now THREAT RESEARCH January 13, 2026 Remote Code Execution With Modern AI/ML Formats and Libraries Apple CVE-2025-23304 CVE-2026-22584 Read now HIGH PROFILE THREATS December 12, 2025 Exploitation of Critical Vulnerability in React Server Components (Updated December 12) Cobalt Strike CVE-2025-55182 CVE-2025-66478 Read now THREAT RESEARCH November 10, 2025 You Thought It Was Over? Authentication Coercion Keeps Evolving Mimikatz PrintNightmare Privilege escalation Read now THREAT RESEARCH November 7, 2025 LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices Android Apple CVE-2025-21042 Read now HIGH PROFILE THREATS November 3, 2025 Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild (Updated November 3) CVE-2025-59287 Microsoft Microsoft Vulnerability Read now THREAT RESEARCH October 31, 2025 When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems GenAI Google LLM Read now
    💬 Team Notes
    Article Info
    Source
    Palo Alto Unit 42
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗