Cyber Posture

CVE-2026-1281

CriticalCISA KEVActive ExploitationRCE

Published: 29 January 2026

Published
29 January 2026
Modified
30 January 2026
KEV Added
29 January 2026
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.8213 99.2th percentile
Risk Priority 89 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1281 is a critical-severity Code Injection (CWE-94) vulnerability in Ivanti Endpoint Manager Mobile. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.8% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation, including applying vendor patches for CVE-2026-1281, to eliminate the code injection vulnerability enabling unauthenticated RCE.

prevent

Mandates information input validation to directly counter code injection (CWE-94) in Ivanti EPMM by sanitizing untrusted inputs and preventing malicious code execution.

preventdetect

Enforces boundary protection to monitor and filter remote network traffic, mitigating unauthenticated remote exploitation attempts on vulnerable EPMM instances.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote code execution via code injection in a public-facing Ivanti EPMM server directly enables T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Deeper analysisAI

CVE-2026-1281 is a code injection vulnerability (CWE-94) affecting Ivanti Endpoint Manager Mobile (EPMM). Published on 2026-01-29, it enables unauthenticated remote code execution on vulnerable instances. The flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its high impact on confidentiality, integrity, and availability.

Attackers require no authentication or privileges and can exploit the vulnerability remotely over the network with low complexity and no user interaction. Successful exploitation allows arbitrary code execution on the affected EPMM server, potentially leading to full system compromise.

Ivanti has issued a security advisory covering CVE-2026-1281 and CVE-2026-1340, which likely details patches and mitigations. The vulnerability appears in CISA's Known Exploited Vulnerabilities Catalog, urging organizations, particularly federal agencies, to apply updates promptly.

CISA's inclusion signals real-world exploitation, emphasizing the need for immediate patching in environments running Ivanti EPMM.

Details

CWE(s)
KEV Date Added
29 January 2026

Affected Products

ivanti
endpoint manager mobile
12.5.1.0, 12.6.0.0, 12.6.1.0, 12.7.0.0 · ≤ 12.5.0.0

CVEs Like This One

CVE-2026-1340Same product: Ivanti Endpoint Manager Mobileboth on KEV
CVE-2026-6973Same product: Ivanti Endpoint Manager Mobileboth on KEV
CVE-2026-7821Same product: Ivanti Endpoint Manager Mobile
CVE-2026-5787Same product: Ivanti Endpoint Manager Mobile
CVE-2026-5788Same product: Ivanti Endpoint Manager Mobile
CVE-2026-5786Same product: Ivanti Endpoint Manager Mobile
CVE-2025-0282Same vendor: Ivantiboth on KEV
CVE-2024-10644Same vendor: Ivanti
CVE-2026-1603Same vendor: Ivantiboth on KEV
CVE-2025-6204Shared CWE-94both on KEV

References