Ivanti EPMM Authenticated RCE Under Active Exploitation; CISA Sets Patch Deadline
Ivanti has confirmed active exploitation of CVE-2026-6973 in its on-premises Endpoint Manager Mobile (EPMM) solution. The authenticated RCE vulnerability can b…

Ivanti confirmed in an advisory released in early May 2026—and subsequently reported by The Hacker News on May 7—that the CVE-2026-6973 vulnerability in its on-premises Endpoint Manager Mobile (EPMM) is being exploited in the wild. While currently limited to a small number of customers, the flaw carries a CVSS score of 7.2 and allows for remote code execution (RCE) by an attacker with valid administrative credentials. The immediate threat extends beyond a single RCE; the vulnerability can be chained with four other flaws patched in the same advisory, some of which are accessible without authentication.
- Ivanti has confirmed active exploitation of CVE-2026-6973 across a limited customer base, though it remains unconfirmed if these attempts resulted in successful compromises.
- The vulnerability exclusively impacts on-premises Ivanti EPMM versions prior to 12.6.1.1, 12.7.0.1, and 12.8.0.1; cloud-based products and other on-prem solutions are unaffected.
- CISA has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply patches by May 10, 2026.
- The administrative authentication barrier may be bypassed by chaining CVE-2026-6973 with four other simultaneously resolved vulnerabilities, some of which require no authentication.
Ivanti Confirms CVE-2026-6973 Exploitation in the Wild
In its early May 2026 advisory, Ivanti acknowledged that CVE-2026-6973 is being leveraged in active attacks. The company noted that the impact is limited to a small number of customers and stated it has not yet determined if the attacks led to successful breaches or remained unsuccessful attempts. Furthermore, the specific threat actor or group responsible has not been identified. The vulnerability stems from an improper input validation defect within Ivanti EPMM on-premises appliances; an attacker capable of connecting to the interface with administrative privileges can execute arbitrary code on the underlying system.
The scope of the impact is narrow but critical. Affected products are strictly limited to on-premises EPMM installations running versions older than 12.6.1.1, 12.7.0.1, and 12.8.0.1. Ivanti Neurons for MDM, Ivanti EPM, and Ivanti Sentry are not impacted—a distinction that reduces the overall attack surface but does little to mitigate risk for organizations still maintaining mobile infrastructure on vulnerable legacy builds.
Classified as an improper input validation flaw, the vulnerability earned a CVSS score of 7.2. This rating reflects a serious risk while remaining below the maximum critical threshold. However, the distinction between an authenticated RCE and an open one is vital: as long as administrative credentials remain secure, the flaw is not directly accessible from the internet without prior compromise steps.
"We are aware of a very limited number of customers exploited with CVE-2026-6973. Successful exploitation requires Admin authentication."
While no public exploit code is currently available, the confirmation of active exploitation proves that at least one actor possesses a functional method to abuse the flaw. The authenticated nature of the RCE provides a primary layer of defense, but its efficacy depends entirely on the integrity of administrative credential management and whether those credentials have been previously exposed.
CISA KEV Listing and the May 10 Federal Deadline
CISA responded swiftly by adding CVE-2026-6973 to its Known Exploited Vulnerabilities (KEV) catalog. The agency has mandated that Federal Civilian Executive Branch (FCEB) agencies apply the necessary patches by May 10, 2026—a deadline that underscores the perceived severity of the threat to critical infrastructure. This urgency arises not only from the confirmation of active exploitation but also from the strategic role EPMM plays as a central control point for enterprise mobile device management.
For the private sector, the federal deadline serves as a significant warning. CISA KEV deadlines are traditionally viewed as high-risk indicators, prompting organizations not strictly bound by federal mandates to prioritize patching. The short window provided by CISA suggests the agency views this vulnerability as particularly dangerous if left unaddressed in enterprise environments.
Vulnerability Chaining: Removing the Admin Prerequisite
The most concerning aspect of the Ivanti advisory is the simultaneous disclosure of four additional vulnerabilities: CVE-2026-5786, CVE-2026-5787, CVE-2026-5788, and CVE-2026-7821. While Ivanti reports that none of these are currently exploited in the wild, some are exploitable without authentication. This detail shifts the risk profile significantly; a flaw requiring admin credentials becomes exponentially more hazardous if collateral vulnerabilities in the same product provide a path to obtain that access level.
According to analysis by Kudelski Security, these four collateral vulnerabilities could allow an attacker to gain administrative access or sensitive information, effectively eliminating the initial prerequisite for exploiting CVE-2026-6973. It has not been confirmed that this specific attack chain has been utilized in the observed incidents, nor is there forensic evidence that admin credentials were stolen via these specific flaws. It remains a grounded technical hypothesis rather than a confirmed fact.
Ivanti’s fixes cover three version branches: 12.6.1.1, 12.7.0.1, and 12.8.0.1. Any organization running a prior build must consider their system exposed, regardless of whether administrative credentials were recently rotated.
The combination of an authenticated RCE with "lighter" unauthenticated flaws is a classic pattern in campaigns targeting management appliances. Because on-premises EPMM is often exposed to the network to manage remote devices, it can become the focal point of a multi-stage attack that begins with leaked info or a compromised admin session and ends with total appliance control.
Remediation and Response Strategy
Organizations utilizing Ivanti EPMM on-premises must follow a rigorous sequence of priorities. Mere patch scheduling is insufficient; the combination of active exploitation and potential vulnerability chaining demands an immediate, structured response.
- Apply Updates Immediately: Install Ivanti’s released patches to move EPMM to versions 12.6.1.1, 12.7.0.1, or 12.8.0.1. The appliance remains vulnerable until the fix is applied, as no alternative mitigations are currently known.
- Rotate Administrative Credentials: Rotate all admin-level passwords and access tokens associated with the appliance. This is particularly critical if rotation was not performed following Ivanti’s January 2026 recommendation. Stale or compromised credentials are the primary prerequisite for this RCE.
- Audit Authentication Logs: Review recent EPMM logs for suspicious or anomalous administrative logins. Given that confirmed exploitation requires this level of privilege, evidence of compromise may exist in logs predating the May advisory.
- Assess Managed Infrastructure Integrity: Treat the vulnerability as a risk for total appliance compromise. Plan a verification of managed mobile devices, as administrative control over EPMM can impact the entire corporate mobile fleet.
The Critical Significance of the January Credential Rotation
Ivanti has directly linked risk mitigation to a previous recommendation. According to the advisory, if customers followed the instruction to rotate credentials in January 2026, the risk of CVE-2026-6973 exploitation is significantly reduced. This suggests the company considers prior compromises or the reuse of credentials exposed in earlier incidents to be a likely vector.
The emphasis on a rotation performed months before the May advisory indicates that the admin access supply chain was already identified as a weak point. Companies that ignored that initial warning now find themselves with potentially stale or compromised credentials—the exact prerequisite that makes CVE-2026-6973 dangerous. The operational lesson is clear: in centralized management products like EPMM, credential hygiene is as vital as patch timeliness.
Even if limited in scope, the confirmation of active exploitation elevates CVE-2026-6973 above routine patching. The true threat is not the isolated use of this flaw, but its integration into a sophisticated chain leveraging the other four vulnerabilities to bypass authentication. For enterprises managing thousands of mobile endpoints via on-prem EPMM, ignoring this advisory leaves a critical gateway to sensitive devices wide open.
Frequently Asked Questions
Are Ivanti cloud services affected?
No. The vulnerability exclusively impacts Ivanti EPMM on-premises versions prior to the specified patches. Ivanti Neurons for MDM, Ivanti EPM, and Ivanti Sentry are not affected.
Can the vulnerability be exploited without authentication?
No. CVE-2026-6973 explicitly requires valid administrative credentials for exploitation. However, four other vulnerabilities resolved in the same advisory could theoretically grant that access, potentially turning an authenticated RCE into a broader attack vector.
Is there a public proof-of-concept (PoC) available?
As of now, no public exploit code has been released for CVE-2026-6973. However, the confirmation of active exploitation means threat actors already possess functional methods, making the lack of a PoC a potential source of false security.
Information has been verified against cited sources and is current as of the time of publication.