Ivanti EPMM Zero-Days Under Attack: CISA Mandates Unprecedented 3-Day Patch Deadline

Two unauthenticated RCE zero-days in Ivanti Endpoint Manager Mobile (EPMM) have prompted CISA to issue a rare 72-hour remediation mandate as active exploitatio…

Ivanti EPMM Zero-Days Under Attack: CISA Mandates Unprecedented 3-Day Patch Deadline

Ivanti confirmed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) platform on January 29, 2026. Tracked as CVE-2026-1281 and CVE-2026-1340, the flaws allow unauthenticated remote code execution (RCE) on Internet-exposed MDM servers. CISA has responded with record-breaking remediation deadlines—approximately three days for federal agencies—with the latest mandate falling on April 11. Technical analysis from Rapid7 honeypots, patch reverse-engineering by watchTowr, and vendor advisories now clarify why these mobile management servers have become primary targets for lateral movement and data exfiltration.

Key Takeaways
  • Both vulnerabilities carry a CVSS score of 9.8 and leverage malformed HTTP GET requests to the /mifs/c/appstore/fob/ and /mifs/c/aftstore/fob/ endpoints to inject commands into server-side Bash scripts.
  • CISA added CVE-2026-1281 to the KEV catalog with a February 1, 2026, deadline, followed by CVE-2026-1340 with an April 11, 2026, deadline—both requiring federal agencies to act within a 72-hour window.
  • Ivanti has released temporary RPM patches that do not survive version upgrades; a permanent fix is scheduled for the EPMM 12.8.0.0 release in Q1 2026.
  • A Rapid7 honeypot detected over 130 unique IP addresses in 24 hours, with 58% of traffic consisting of active exploitation attempts via reverse shells, webshells, and automated droppers.

Technical Breakdown: From HTTP GET to MDM Shell

The core of the attack lies in two unauthenticated endpoints within Ivanti EPMM. By sending malformed GET parameters to /mifs/c/appstore/fob/ and /mifs/c/aftstore/fob/, attackers can inject input into the map-appstore-url and map-aft-store-url Bash scripts. Technical analysis by watchTowr Labs on Ivanti’s RPM patches revealed that parameters such as st can carry arbitrary payloads, leading to system-level command execution with a CVSS score of 9.8.

Because MDM servers manage corporate mobile device policies, certificates, and credentials, a compromise provides attackers with a high-privilege foothold. Once inside, threat actors can move laterally across the internal network or access sensitive data stored on managed mobile terminals.

CISA KEV Deadlines Signal Critical Risk

CISA added CVE-2026-1281 to the Known Exploited Vulnerabilities (KEV) catalog in early February, setting a compliance date of February 1, 2026. The subsequent addition of CVE-2026-1340 on April 8, 2026, with an April 11 deadline, mirrored this aggressive pace. This roughly 72-hour window is exceptional even by CISA KEV standards and indicates a maximum risk assessment.

In its advisory, Ivanti stated: "We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure." While independent confirmation of pre-patch exploitation for CVE-2026-1340 remains limited outside of the KEV listing, the sequence of CISA orders has placed federal agencies under unprecedented pressure. While these deadlines are only binding for FCEB agencies, they serve as a critical benchmark for private organizations managing sensitive infrastructure.

The severity of the 9.8 CVSS score, combined with the lack of authentication requirements, explains why CISA compressed remediation timelines beyond standard practice.

Active Exploitation: Insights from Rapid7 Honeypots

Technical disclosure has triggered a measurable surge in malicious traffic. According to Christiaan Beek, Senior Director of Threat Intelligence at Rapid7, a dedicated honeypot captured over 130 unique IP addresses in just 24 hours. Crucially, 58% of these connections were identified as active exploitation attempts rather than passive reconnaissance.

"In just 24 hours, our Ivanti EPMM honeypot recorded hundreds of inbound traffic connections from more than 130 unique IP addresses, with 58% directly attempting exploitation of the latest Ivanti EPMM vulnerabilities" - Christiaan Beek, Senior Director Threat Intelligence, Rapid7

The dominant payloads were not simple scans; they included reverse shells targeting port 443, webshell deployments, and automated droppers. Beek explained that these tools were "built to gain control fast through reverse shells over port 443, webshell deployment attempts, and automated droppers." Exposed EPMM servers became high-priority targets within a day, with the window of exposure measured in hours rather than days.

Persistence Risks and Interim Patch Limitations

Ivanti has warned that attackers maintain persistence through web shells and reverse shells once initial access is gained. Current updates delivered as RPM patches are interim solutions: they do not survive version upgrades. A structural fix is expected in the EPMM 12.8.0.0 release, slated for Q1 2026, though a specific date has not been announced.

Adding to the challenge for incident responders, the vendor explicitly stated it lacks sufficiently reliable atomic Indicators of Compromise (IoCs). This forces organizations to conduct broad threat hunting using patterns identified by Rapid7. Manual log analysis of access to the /mifs/c/appstore/fob/ and /mifs/c/aftstore/fob/ endpoints is now mandatory, as there are no known file hashes to rely on for automated scanning.

Benjamin Harris, CEO of watchTowr, emphasized the gravity of the situation: "While patches are available from Ivanti, applying patches will not be enough – threat actors have been exploiting these vulnerabilities as zero-days, and organizations that are as of disclosure exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure and instigate incident response processes." This recommendation moves beyond simple patching toward full infrastructure reconstruction and credential rotation.

This scenario makes EPMM a worst-case security event: patching alone is insufficient without forensic verification of the server's state before returning it to production.

Immediate Mitigation and Response Strategy

Given the lack of atomic IoCs and the absence of a permanent patch, the response must be rapid and comprehensive.

  • Incident Response for Every Exposed Node: Both Ivanti and researchers agree that if an EPMM server was Internet-accessible at the time of disclosure, it must be treated as potentially compromised and isolated for forensic analysis.
  • Apply Interim RPM Patches: Deploy Ivanti’s RPM patches immediately, while acknowledging that they will need to be reapplied after any version upgrade until EPMM 12.8.0.0 is released.
  • Hunt for Persistence: In the absence of reliable IoCs, security teams must actively search for web shells, reverse shells, and log anomalies at the affected endpoints using Rapid7’s behavioral patterns.
  • Full Trust Rotation: All certificates, service credentials, and MDM policies managed by the server should be rotated to mitigate lateral movement risks from previously exfiltrated keys.

The Ivanti EPMM situation demonstrates that MDM servers—centralized hubs of high-trust relationships—are now primary strategic targets. The three-day remediation window imposed by CISA reflects a level of risk that private organizations should adopt as their own internal standard. For security teams, the question is no longer just how to patch, but whether an exposed instance has already established a silent backdoor.

Which Ivanti products are at risk?

The company has clarified that these two vulnerabilities specifically affect Endpoint Manager Mobile (EPMM). Other products, including Neurons for MDM, Endpoint Manager (EPM), and Sentry, are not affected.

Why are the current patches considered interim?

Ivanti released updates in RPM format that close the vulnerability but are wiped during version upgrades. A permanent structural fix is expected in EPMM 12.8.0.0, scheduled for release sometime in Q1 2026.

How does the lack of atomic IoCs impact defense?

Because there are no precise, verifiable Indicators of Compromise, organizations cannot rule out an intrusion through simple signature-based scans. Instead, defenders must conduct proactive threat hunting to detect the presence of webshells or reverse shells.

Information has been verified against cited sources and is current at the time of publication.

Sources