Anavem
Languagefr
Server room with emergency lighting and smartphone in foreground suggesting mobile security breach

Ivanti EPMM Zero-Day Exploited in Active Attacks

Ivanti warns customers to immediately patch CVE-2024-29847, a high-severity RCE vulnerability in Endpoint Manager Mobile being actively exploited by attackers.

7 May 2026, 17:20 5 min read

Last updated 7 May 2026, 21:58

SEVERITYCritical 9.1/10
CVE IDCVE-2024-29847
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORIvanti
AFFECTEDEndpoint Manager Mobile (EPMM)...
CATEGORYVulnerabilities

Key Takeaways

Ivanti EPMM Zero-Day Attack Campaign Targets Enterprise Mobile Management

Ivanti disclosed on May 7, 2026, that attackers are actively exploiting CVE-2024-29847, a critical remote code execution vulnerability in its Endpoint Manager Mobile (EPMM) platform. The company issued emergency security advisories warning that the flaw allows unauthenticated attackers to execute arbitrary code on vulnerable EPMM servers through specially crafted network requests.

The vulnerability affects the core authentication mechanism in EPMM's web interface, where improper input validation allows attackers to bypass security controls and gain administrative access. Security researchers discovered the flaw during routine penetration testing of enterprise mobile device management solutions, but threat actors had already begun exploiting it in targeted campaigns against organizations managing large mobile device fleets.

Ivanti's security team confirmed that the exploitation attempts began in late April 2026, with attackers specifically targeting healthcare, financial services, and government organizations that rely heavily on mobile device management for remote workforce operations. The attack chain involves sending malformed HTTP requests to the EPMM server's authentication endpoint, triggering a buffer overflow condition that allows code injection. Once successful, attackers gain full administrative privileges over the EPMM instance, including access to all managed mobile devices, corporate applications, and sensitive configuration data.

The CISA Known Exploited Vulnerabilities catalog added CVE-2024-29847 within hours of Ivanti's disclosure, emphasizing the active threat landscape surrounding this vulnerability. Intelligence reports indicate that multiple threat groups are now incorporating this exploit into their attack frameworks, with some campaigns showing characteristics consistent with advanced persistent threat (APT) operations targeting intellectual property and sensitive corporate data accessible through compromised mobile management platforms.

Critical Impact Scope for EPMM Deployments Across Enterprise Networks

The vulnerability impacts all versions of Ivanti Endpoint Manager Mobile prior to the emergency patches released May 7, 2026. Specifically affected are EPMM versions 11.4 (all builds prior to 11.4.14.0), version 11.10 (all builds prior to 11.10.16.0), and version 12.0 (all builds prior to 12.0.5.0). Organizations running these versions with internet-facing EPMM servers face immediate risk of compromise, as the vulnerability requires no authentication and can be exploited remotely over standard HTTPS connections.

The attack vector particularly threatens large enterprises and government agencies that deploy EPMM to manage thousands of mobile devices across distributed workforces. Healthcare organizations using EPMM to secure medical devices and patient data access systems face especially severe risk, as successful exploitation could lead to HIPAA violations and patient safety concerns. Financial institutions managing mobile banking applications and trading platforms through EPMM also represent high-value targets for attackers seeking to access financial systems and customer data.

Network configurations that expose EPMM administrative interfaces to the internet without additional network segmentation amplify the risk significantly. Organizations using default EPMM configurations, particularly those that haven't implemented multi-factor authentication for administrative access or network-level access controls, face the highest probability of successful exploitation. The vulnerability's CVSS score of 9.1 reflects its network-based attack vector, the lack of required user interaction, and the complete system compromise possible upon successful exploitation.

Emergency Patching and Immediate Mitigation Steps for EPMM Administrators

Ivanti released emergency patches for all affected EPMM versions on May 7, 2026, available through the company's customer portal and automatic update mechanisms. Administrators must immediately upgrade to EPMM 11.4.14.0, 11.10.16.0, or 12.0.5.0 depending on their current deployment version. The patches address the underlying input validation flaw in the authentication subsystem and implement additional security controls to prevent similar exploitation techniques.

Organizations unable to apply patches immediately should implement network-level mitigations to reduce exposure risk. This includes restricting EPMM server access to trusted IP ranges through firewall rules, implementing web application firewall (WAF) protection with rules specifically designed to block malformed authentication requests, and enabling comprehensive logging for all EPMM administrative activities. Network administrators should also consider temporarily disabling internet-facing EPMM access and requiring VPN connections for all administrative operations until patches can be deployed.

Detection guidance includes monitoring EPMM server logs for unusual authentication patterns, particularly failed login attempts followed by successful administrative access from the same source IP. Security teams should examine network traffic for HTTP requests containing unusual character encodings or oversized parameter values targeting EPMM authentication endpoints. The vulnerability leaves specific indicators in system logs, including process creation events with elevated privileges spawned from the EPMM service context and network connections initiated by EPMM processes to external IP addresses not associated with normal mobile device management operations.

Post-compromise recovery requires complete EPMM server rebuilding from known-good backups, thorough analysis of all managed mobile devices for signs of unauthorized configuration changes or malicious application installations, and comprehensive audit of all administrative actions performed during the potential compromise window. Organizations should also review and rotate all certificates, API keys, and administrative credentials associated with their EPMM deployment as part of the recovery process.

Frequently Asked Questions

How do I check if my Ivanti EPMM server is vulnerable to CVE-2024-29847?+
Check your EPMM version in the administrative console under System Information. Versions 11.4 prior to 11.4.14.0, 11.10 prior to 11.10.16.0, and 12.0 prior to 12.0.5.0 are vulnerable. If your server is internet-facing and running these versions, apply emergency patches immediately.
What can attackers do if they exploit the Ivanti EPMM zero-day vulnerability?+
Successful exploitation grants attackers complete administrative control over the EPMM server, including access to all managed mobile devices, corporate applications, and configuration data. Attackers can install malicious applications, steal sensitive data, and use the compromised system as a pivot point for further network attacks.
Are there temporary workarounds if I cannot immediately patch CVE-2024-29847?+
Temporarily restrict EPMM server access to trusted IP ranges through firewall rules and disable internet-facing access if possible. Implement web application firewall protection and require VPN connections for administrative access. However, these are temporary measures and patching remains the only complete solution.

Discussion

Share your thoughts and insights

Sign in to join the discussion