⚠️ CISA Known Exploited Vulnerability
Active ThreatThis vulnerability is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog. Active exploitation has been observed in the wild. This poses significant risk to federal enterprises and should be prioritized for immediate patching.
CVE-2026-1340
Critical CISA KEVVulnerability Description
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
70 configuration(s) from 1 vendor(s)
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.5.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.8.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.12.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.12.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.12.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.10.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.6.0.01:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.10.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.11.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.11.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.10.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.7.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.10.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.9.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.12.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.6.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.9.0:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:11.12.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ivanti:endpoint_manager_mobile:12.0.0.5:*:*:*:*:*:*:*
References & Resources
-
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-13403c1d8aa1-5a33-4ea4-8992-aadd6440af75 Vendor Advisory
-
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1340134c704f-9b21-4f2e-91b3-4a467353bcc0 Third Party Advisory US Government Resource
Severity Details
CISA KEV Status
Listed in CISA's Known Exploited Vulnerabilities catalog
Weakness Type (CWE)
Improper Control of Generation of Code ('Code Injection')
- Description
- The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- January 29, 2026
External Resources
Related News Articles
Latest news and updates about CVE-2026-1340
