Endpoint Manager Mobile

5 CVEs product

Monthly

CVE-2026-1281 CRITICAL KEV PATCH THREAT Act Now

Ivanti Endpoint Manager Mobile (EPMM) contains a critical code injection vulnerability (CVE-2026-1281, CVSS 9.8) that allows unauthenticated remote attackers to execute arbitrary code. With EPSS 64.8% and KEV listing, this vulnerability in the mobile device management platform threatens the security of every managed mobile device in the organization, as EPMM has the ability to push configurations, certificates, and apps to enrolled devices.

Ivanti RCE Code Injection Endpoint Manager Mobile
NVD VulDB
CVSS 3.1
9.8
EPSS
64.8%
Threat
5.4
CVE-2025-6771 HIGH Act Now

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2,12.4.0.3 and 12.3.0.3 allows a remote authenticated attacker with high privileges to achieve remote code execution

RCE Command Injection Ivanti Endpoint Manager Mobile
NVD
CVSS 3.1
7.2
EPSS
20.8%
CVE-2025-6770 HIGH Act Now

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution

RCE Command Injection Ivanti Endpoint Manager Mobile
NVD
CVSS 3.1
7.2
EPSS
12.0%
CVE-2025-4428 HIGH KEV THREAT CERT-EU Act Now

Ivanti Endpoint Manager Mobile (EPMM) contains an authenticated code injection in the API component, allowing authenticated attackers to execute arbitrary code through crafted API requests.

RCE Code Injection Ivanti Endpoint Manager Mobile
NVD
CVSS 3.1
7.2
EPSS
45.3%
CVE-2025-4427 MEDIUM POC KEV THREAT CERT-EU This Month

An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and public exploit code available.

Authentication Bypass Ivanti Endpoint Manager Mobile
NVD Exploit-DB
CVSS 3.1
5.3
EPSS
91.6%
CVE-2026-1281
EPSS 65% 5.4 CVSS 9.8
CRITICAL KEV PATCH THREAT Act Now

Ivanti Endpoint Manager Mobile (EPMM) contains a critical code injection vulnerability (CVE-2026-1281, CVSS 9.8) that allows unauthenticated remote attackers to execute arbitrary code. With EPSS 64.8% and KEV listing, this vulnerability in the mobile device management platform threatens the security of every managed mobile device in the organization, as EPMM has the ability to push configurations, certificates, and apps to enrolled devices.

Ivanti RCE Code Injection +1
NVD VulDB
CVE-2025-6771
EPSS 21% CVSS 7.2
HIGH Act Now

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2,12.4.0.3 and 12.3.0.3 allows a remote authenticated attacker with high privileges to achieve remote code execution

RCE Command Injection Ivanti +1
NVD
CVE-2025-6770
EPSS 12% CVSS 7.2
HIGH Act Now

OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution

RCE Command Injection Ivanti +1
NVD
CVE-2025-4428
EPSS 45% CVSS 7.2
HIGH KEV THREAT Act Now

Ivanti Endpoint Manager Mobile (EPMM) contains an authenticated code injection in the API component, allowing authenticated attackers to execute arbitrary code through crafted API requests.

RCE Code Injection Ivanti +1
NVD
CVE-2025-4427
EPSS 92% CVSS 5.3
MEDIUM POC KEV THREAT This Month

An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and public exploit code available.

Authentication Bypass Ivanti Endpoint Manager Mobile
NVD Exploit-DB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy