Skip to content
Actively exploitedCVSS 7.2 · HIGH

CVE-2026-6973

Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution.

View on NVD

Analysis

Ivanti Endpoint Manager Mobile (EPMM) is vulnerable to remote code execution (RCE) via improper input validation. CISA has confirmed this vulnerability is being actively exploited in the wild, and administrators should update to versions 12.6.1.1, 12.7.0.1, or 12.8.0.1 immediately.

Severity

Score: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: HIGH
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-20

CISA KEV

Added to KEV: 2026-05-07
Federal patch deadline: 2026-05-10
Known ransomware use: Unknown
Required action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

EPSS

No EPSS score yet (CVE may be too fresh).

Affects

ivanti:endpoint_manager_mobile

Technical description

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

Published: 5/7/2026, 4:16:23 PM
Last modified: 5/7/2026, 7:18:39 PM

References

HomeEventsBlogResourcesTeam