CVE-2026-1281
Published: 29 January 2026
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2026-1281 is a code injection vulnerability (CWE-94) affecting Ivanti Endpoint Manager Mobile (EPMM). Published on 2026-01-29, it enables unauthenticated remote code execution on vulnerable instances. The flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impact on confidentiality, integrity, and availability.
Attackers require no authentication or privileges and can exploit the vulnerability remotely over the network with low complexity and no user interaction. Successful exploitation allows arbitrary code execution on the affected EPMM server, potentially leading to full system compromise.
Ivanti has issued a security advisory covering CVE-2026-1281 and CVE-2026-1340, which likely details patches and mitigations. The vulnerability appears in CISA's Known Exploited Vulnerabilities Catalog, urging organizations, particularly federal agencies, to apply updates promptly.
CISA's inclusion signals real-world exploitation, emphasizing the need for immediate patching in environments running Ivanti EPMM.
Details
- CWE(s)
- KEV Date Added
- 29 January 2026
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Unauthenticated remote code execution via code injection in a public-facing Ivanti EPMM server directly enables T1190: Exploit Public-Facing Application.