Description
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Published: 2026-01-29
Score: 9.8 Critical
EPSS: 70.8% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

Impact

Ivanti Endpoint Manager Mobile contains a code injection flaw that permits attackers to inject arbitrary code and execute it without authentication. The vulnerability is identified as CWE‑94, which signifies that the software fails to properly validate or sanitize input before using it in a code context. Because the flaw allows unauthenticated users to run code, a compromised client or forged request could lead to full system compromise, data theft, or further lateral movement within the network.

Affected Systems

The affected product is Ivanti Endpoint Manager Mobile. Specific affected versions are not listed in the information provided, so all deployments of this product should be considered vulnerable until confirmed otherwise.

Risk and Exploitability

The CVSS score of 9.8 signifies critical severity, and an EPSS score of approximately 0.7% indicates an extremely low probability of exploitation in general populations. The vulnerability is also included in CISA’s Known Exploited Vulnerabilities catalog, confirming that active exploitation has been observed. Based on the description, the attack vector is inferred to be through the mobile endpoint, likely via in‑app requests or API calls, and does not require prior authentication. An attacker can exploit the flaw by sending a crafted payload that is executed on the server, leading to remote code execution and full compromise of the affected system.

Generated by OpenCVE AI on May 2, 2026 at 00:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the vendor‑issued patch or upgrade to the latest Ivanti Endpoint Manager Mobile release that fixes the code‑injection flaw.
  • Reconfigure the application to disable or restrict remote code execution endpoints and enforce authenticated access for all API routes that accept payloads.
  • Enable detailed logging and monitoring on the Endpoint Manager Mobile server to detect anomalous code‑execution attempts and investigate any alerts.

Generated by OpenCVE AI on May 2, 2026 at 00:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 01:15:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution via Code Injection in Ivanti Endpoint Manager Mobile

Wed, 29 Apr 2026 22:00:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution in Ivanti Endpoint Manager Mobile via Code Injection

Wed, 29 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution in Ivanti Endpoint Manager Mobile via Code Injection

Tue, 28 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution in Ivanti Endpoint Manager Mobile via Code Injection

Wed, 22 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution in Ivanti Endpoint Manager Mobile via Code Injection

Sat, 18 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution via Code Injection in Ivanti Endpoint Manager Mobile

Wed, 15 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Title Unauthenticated Remote Code Execution via Code Injection in Ivanti Endpoint Manager Mobile

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2026-04-08T00:00:00+00:00', 'dueDate': '2026-04-11T00:00:00+00:00'}


Fri, 20 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Ivanti
Ivanti endpoint Manager Mobile
Vendors & Products Ivanti
Ivanti endpoint Manager Mobile

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
Description A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Ivanti Endpoint Manager Mobile
cve-icon MITRE

Status: PUBLISHED

Assigner: ivanti

Published:

Updated: 2026-04-09T03:55:54.081Z

Reserved: 2026-01-22T14:59:56.988Z

Link: CVE-2026-1340

cve-icon Vulnrichment

Updated: 2026-01-29T22:07:06.086Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T22:15:53.313

Modified: 2026-04-09T14:03:31.767

Link: CVE-2026-1340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T01:00:15Z

Weaknesses