Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks

Posted on January 30, 2026January 30, 2026 By CWS

Two essential code-injection vulnerabilities have been disclosed within the Endpoint Supervisor Cell (EPMM) platform, that are at the moment being actively exploited in real-world assaults.

The safety flaws, tracked as CVE-2026-1281 and CVE-2026-1340, enable unauthenticated attackers to execute arbitrary code remotely on susceptible methods.

The vulnerabilities carry a most CVSS severity rating of 9.8 and have an effect on a number of variations of EPMM, together with 12.5.0.0, 12.6.0.0, and 12.7.0.0.

In keeping with Ivanti’s safety advisory revealed on January 29, 2026, the corporate is conscious of a restricted variety of buyer environments which have already been compromised on the time of disclosure.

Lively Exploitation Confirmed

Each vulnerabilities stem from code-injection weaknesses (CWE-94) that may be exploited with out authentication or person interplay.

The assault vector is network-based and low-complexity, enabling risk actors to compromise susceptible EPMM cases remotely with minimal effort.

Profitable exploitation grants attackers full management over the confidentiality, integrity, and availability of affected methods.

CVE NumberDescriptionCVSS ScoreCVSS VectorCWECVE-2026-1281Code injection enabling unauthenticated RCE9.8 (Crucial)AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-94CVE-2026-1340Code injection enabling unauthenticated RCE9.8 (Crucial)AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-94

Ivanti has launched version-specific RPM patches to deal with the safety flaws. On the similar time, clients await the everlasting repair scheduled for model 12.8.0.0 in Q1 2026.

The short-term patches require no system downtime and don’t impression characteristic performance. Nonetheless, directors should reapply the RPM script after model upgrades.

Organizations operating EPMM ought to instantly apply the version-specific RPM patches out there via Ivanti’s help portal.

Prospects utilizing variations 12.5.0.x via 12.7.0.x require RPM 12.x.0.x, whereas these on 12.5.1.0 or 12.6.1.0 ought to deploy RPM 12.x.1.x.

The corporate emphasizes that just one patch is required primarily based on the deployed model.

Ivanti recommends security-conscious organizations take into account rebuilding EPMM environments and migrating knowledge to substitute methods as essentially the most conservative remediation strategy.

The corporate has supplied technical evaluation documentation with forensic steering, although dependable indicators of compromise stay unavailable as investigations proceed.

Notably, different Ivanti merchandise together with Endpoint Supervisor (EPM), Neurons for MDM, and Sentry home equipment should not affected by these vulnerabilities.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Attacks, Critical, Endpoint, Exploited, Ivanti, Manager, RCE, Vulnerabilities

Post navigation

Previous Post: Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed
Next Post: ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

Related Posts

Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data Cyber Security News
AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News
Threat Actors Exploiting Black Friday Shopping Hype Cyber Security News
NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard Cyber Security News
Threat Actors Targeting Ukraine’s Defense Forces With Charity-Themed Malware Campaign Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Badges, Bytes and Blackmail
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
  • Critical Ivanti Endpoint Manager RCE Vulnerabilities Actively Exploited in Attacks
  • Education-Themed Malicious Domains Linked to Bulletproof Hosting Infrastructure Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark