CVE-2026-1340
Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability - [Actively Exploited]
Description
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
INFO
Published Date :
Jan. 29, 2026, 10:15 p.m.
Last Modified :
April 9, 2026, 2:03 p.m.
Remotely Exploit :
Yes !
Source :
3c1d8aa1-5a33-4ea4-8992-aadd6440af75
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Unknown
Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 3c1d8aa1-5a33-4ea4-8992-aadd6440af75 | ||||
| CVSS 3.1 | CRITICAL | MITRE-CVE |
Solution
- Apply vendor patches or updates immediately.
- Review Ivanti Endpoint Manager Mobile security settings.
- Restrict network access to the affected system.
- Monitor for suspicious activities.
Public PoC/Exploit Available at Github
CVE-2026-1340 has a 7 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-1340.
| URL | Resource |
|---|---|
| https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 | Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1340 | Third Party Advisory US Government Resource |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-1340 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-1340
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Retrieves CVEs added in the last N days from CISA's Known Exploited Vulnerability (KEV) database.
Python
Security Tracker
Python
Open-source WAF bypass toolkit — 4,300+ payloads, 35+ recon checks, 98 WAF/CDN vendors, AI-assisted bypass, security hardening. For pentesters, bug bounty hunters, and DevSecOps.
owasp payload-database cloudflare vulnerability waf xss mcp-server bugbounty pentesting recon mcp waf-bypass attack-surface penetration-testing python security security-tools sql-injection vulnerability-scanner waf-detection
Dockerfile Python TypeScript HTML Ruby Shell
A simple demo application that shows how to reproduce the Ivanti EPMM pre-auth RCE vulnerability (CVE-2026-1281 / CVE-2026-1340) for educational and security research purposes.
Dockerfile Shell
Proof of Concept for CVE-2026-1281 & CVE-2026-1340 - Ivanti EPMM Pre-Auth RCE via Bash Arithmetic Expansion
Shell Python
CVE-2026-1281
Python
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-1340 vulnerability anywhere in the article.
-
Daily CyberSecurity
Active SharePoint Spoofing and Legacy Office RCE: CISA Alerts on New KEV Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog, sounding a fresh warning about two high-risk security flaws currently being ... Read more
-
Daily CyberSecurity
The CVE Watchtower: Weekly Threat Intelligence Briefing (April 6 – April 12, 2026)
Welcome to this week’s vulnerability digest. As we close out the first full week of April, security teams are faced with a challenging landscape of critical zero-days, active exploitations, and severe ... Read more
-
Daily CyberSecurity
Encryption Bypasses and Kubernetes Token Leaks Hit Apache Tomcat
Apache Tomcat, the open-source backbone for millions of Java-based web applications, has been hit by a wave of security disclosures. A comprehensive audit has revealed ten distinct vulnerabilities aff ... Read more
-
Daily CyberSecurity
Root Access at Risk: Critical Nix Sandbox Escape Overwrites Sensitive System Files
A severe security vulnerability has been identified in the Nix package manager, a tool celebrated by the Linux and Unix communities for making package management reliable and reproducible. Tracked as ... Read more
-
Daily CyberSecurity
Critical Privilege Escalation in Checkmk: Root Access at Risk
A critical-severity security vulnerability has been identified in the Checkmk monitoring platform, potentially allowing local users to seize full control of the host system. The flaw, tracked as CVE-2 ... Read more
-
Daily CyberSecurity
HPE Aruba Patches High-Severity Credential Theft Flaw
HPE Aruba Networking has issued an important software update to address a high-severity security flaw in its Private 5G Core On-Prem Platform. The vulnerability, tracked as CVE-2026-23818, could allow ... Read more
-
Daily CyberSecurity
TP-Link Archer AX53 Hit by Multiple High-Severity Vulnerabilities
TP-Link has issued an urgent security advisory regarding its Archer AX53 v1.0 router, detailing five distinct vulnerabilities that could allow attackers to seize control of the device or leak sensitiv ... Read more
-
Daily CyberSecurity
Cloud Engineering at Risk: AWS Patches Critical Privilege Escalation and RCE Flaws in RES
Research and Engineering Studio on AWS architecture | Image: AWS Amazon Web Services (AWS) has released urgent security updates for its Research and Engineering Studio (RES), an open-source portal des ... Read more
-
CybersecurityNews
CISA Warns of Critical Ivanti EPMM Code Injection Vulnerability Exploited in Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical security flaw in Ivanti Endpoint Manager Mobile (EPMM). The agency recently added this fla ... Read more
-
Daily CyberSecurity
Denial of Service Alert: React Server Components Vulnerability Causes CPU Spikes
React, the popular JavaScript library used by millions of developers for building user interfaces, has issued an urgent advisory regarding a denial of service (DoS) vulnerability. The flaw specificall ... Read more
-
Daily CyberSecurity
Sandbox Escape: Critical Flatpak Flaw Grants Full Host Access
Flatpak, the widely-used system for building, distributing, and running sandboxed desktop applications on Linux, has been hit by a critical security vulnerability. The flaw, tracked as CVE-2026-34078 ... Read more
-
Daily CyberSecurity
Security Alert: GitLab Issues Patch for High-Severity Vulnerabilities Across CE and EE
GitLab has released critical security updates for Community Edition (CE) and Enterprise Edition (EE). Versions 18.10.3, 18.9.5, and 18.8.9 address multiple high and medium-severity flaws that could co ... Read more
-
Daily CyberSecurity
The $86,000 Patch: Chrome 147 Crushes “Critical” WebML Memory Flaws
The Google Chrome team has officially promoted Chrome 147 to the stable channel for Windows, Mac, and Linux. This update, labeled version 147.0.7727.55/56, is a heavyweight release aimed at squashing ... Read more
-
Daily CyberSecurity
CISA Warning: Critical Ivanti EPMM Code Injection Vulnerability Under Active Attack
The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities ... Read more
-
NVISO Labs
Ivanti EPMM ‘Sleeper Shells’ not so sleepy?
In late January 2026 an advisory covering two remote code execution vulnerabilities (CVE-2026-1281 & CVE-2026-1340) in Ivanti Endpoint Manager Mobile (EPMM) was published. Shortly after reports (in ex ... Read more
-
europa.eu
Cyber Brief 26-03 - February 2026
Cyber Brief (February 2026)March 2, 2026 – Version: 1TLP:CLEARExecutive summaryWe analysed 303 open source reports for this Cyber Security Brief1.Relating to cyber policy and law enforcement, the Euro ... Read more
-
The Register
Attacker gets into France's database listing all bank accounts, makes off with 1.2 million records
Infosec In Brief An unknown attacker accessed the French government’s database listing every bank account in the country and made off with 1.2 million records. France’s Ministry of Economics, Finance ... Read more
-
CybersecurityNews
Critical Ivanti EPMM Zero-Day Vulnerabilities Exploited in The Wild Targeting Corporate Networks
Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) have emerged as a major threat to enterprise networks, with active exploitation campaigns targeting corporate infrastruct ... Read more
-
The Cyber Express
Attackers Deploy Dormant Backdoors in Ivanti EPMM to Bypass Patching of Latest 0-Days
Threat actors weaponized two Ivanti zero-days so quickly that security teams discovered web shells already installed on servers—using arithmetic expansion in bash scripts to slip past authentication e ... Read more
-
Daily CyberSecurity
“Dormant” Backdoors: Ivanti EPMM Zero-Days Exploited to Plant Long-Term Spies
Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) are currently being exploited in a widespread campaign to compromise enterprise networks across the globe. A new report f ... Read more
The following table lists the changes that have been made to the
CVE-2026-1340 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Modified Analysis by [email protected]
Apr. 09, 2026
Action Type Old Value New Value Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1340 Types: Third Party Advisory, US Government Resource -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Apr. 08, 2026
Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1340 -
Initial Analysis by [email protected]
Feb. 20, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:* versions up to (including) 12.7.0.0 Added Reference Type ivanti: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340 Types: Vendor Advisory -
New CVE Received by 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Jan. 29, 2026
Action Type Old Value New Value Added Description A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-94 Added Reference https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340