BSI warning: Ivanti EPMM vulnerability is widely exploited

The Federal Office for Information Security (BSI) and IT researchers warn of widespread attacks on Ivanti EPMM.

listen Print view
Red skull on black background

(Image: Titima Ongkantong / Shutterstock.com)

2 min. read

At the end of January, Ivanti closed critical vulnerabilities in Endpoint Manager Mobile (EPMM). Attackers can use these to inject malicious code – and are already doing so; initial attacks were already known. Now the Federal Office for Information Security (BSI) is warning of widespread attacks on the vulnerabilities and recommends using a detection script to identify successful attacks. IT security researchers from Palo Alto have also published a warning and explain some of the observed abuse attempts in more detail.

Ivanti is holding back on details about the security vulnerabilities, but IT researchers from Palo Alto Networks Unit42 provide more precise information. One vulnerability stems from outdated Bash scripts used by the included Apache web server for URL rewriting (CVE-2026-1281, CVSS 9.8, Risk "critical"). The second vulnerability also stems from an insecure Bash script but affects Ivanti's Android file transfer mechanism (CVE-2026-1340, CVSS 9.8, Risk "critical").

After exploiting the vulnerabilities, attackers set up reverse shells and web shells, explore the environment, and download further malware. According to Unit42, targets include state and local governments, healthcare, manufacturing, law firms, and the high-tech sector.

The BSI also issued an updated warning last week. The authority also provides indicators of (successful) attacks (Indicators of Compromise, IOCs) and strongly points to a detection script that Ivanti published with the Dutch IT security authority NCSC-NL. These are Ivanti-Host-EPMM-Scan-v2-0S-2 and Ivanti-Host-EPMM-Scan-v2-0L-2, both updated on February 12, 2026.

Videos by heise

The BSI classifies the vulnerabilities and attacks on them in the third severity category, "Orange." In practical terms, this means "Measures must be taken immediately. Massive disruption of normal operations is possible." The BSI has indications that the vulnerabilities have been attacked since at least summer 2025. Admins should consider this in their investigations.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.