<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:* — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/cpes/cpe2.3aivantiendpoint_manager_mobile/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 14:54:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/cpes/cpe2.3aivantiendpoint_manager_mobile/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ivanti EPMM Authenticated Remote Code Execution Vulnerability Exploited</title><link>https://feed.craftedsignal.io/briefs/2026-05-ivanti-eppm-rce/</link><pubDate>Thu, 07 May 2026 14:54:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-ivanti-eppm-rce/</guid><description>CVE-2026-6973, an authenticated remote code execution vulnerability in Ivanti Endpoint Manager Mobile (EPMM), is being actively exploited, potentially leading to data breaches and system compromise.</description><content:encoded><![CDATA[<p>Ivanti has released security updates to address multiple vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). The most critical vulnerability, CVE-2026-6973, is an improper input validation issue that allows an authenticated attacker with administrative access to execute arbitrary code remotely. Ivanti is aware of a limited number of customers being actively exploited via CVE-2026-6973. Successful exploitation could lead to data breaches, system compromise, and operational downtime. This vulnerability, along with CVE-2026-5786, CVE-2026-5787, CVE-2026-5788 and CVE-2026-7821, affects Ivanti EPMM versions before 12.6.1.1, 12.7.0.1, and 12.8.0.1. It is believed that administrative credentials used to exploit CVE-2026-6973 were obtained through previous exploitation of CVE-2026-1340.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise via CVE-2026-1340, allowing attackers to gain administrative credentials.</li>
<li>Attacker authenticates to the Ivanti EPMM administrative interface.</li>
<li>Exploitation of CVE-2026-6973 through crafted requests to the server.</li>
<li>Improper input validation allows the attacker to inject malicious code.</li>
<li>The injected code is executed within the context of the EPMM server.</li>
<li>Attacker gains remote code execution on the EPMM server.</li>
<li>Attacker leverages the compromised server to access sensitive data.</li>
<li>Exfiltration of sensitive data and potential deployment of malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6973 can lead to data breaches, system compromise, and operational downtime. A limited number of customers have reportedly been affected. The compromised EPMM server can be used as a pivot point to access other systems within the network, potentially impacting the confidentiality, integrity, and availability of critical business operations. Other vulnerabilities such as CVE-2026-5787 allow impersonation of Sentry hosts and obtaining valid CA-signed client certificates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security updates provided by Ivanti to patch CVE-2026-6973, CVE-2026-5786, CVE-2026-5787, CVE-2026-5788 and CVE-2026-7821 in Ivanti EPMM versions before 12.6.1.1, 12.7.0.1, and 12.8.0.1.</li>
<li>Review accounts with administrative rights on Ivanti EPMM and rotate credentials where necessary, as recommended by the vendor.</li>
<li>Monitor web server logs for suspicious activity indicative of CVE-2026-6973 exploitation. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Investigate and remediate any potential compromises resulting from the exploitation of CVE-2026-1340, if present, as a potential source of compromised credentials.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>ivanti</category><category>eppm</category><category>rce</category><category>vulnerability</category><category>exploitation</category></item></channel></rss>