CVE-2026-6973
Received
Received - Intake
Improper Input Validation in Ivanti EPMM Leads to RCE
Publication date: 2026-05-07
Last updated on: 2026-05-07
Assigner: ivanti
Description
Description
An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ivanti | epmm | to 12.6.1.1 (exc) |
| ivanti | epmm | to 12.7.0.1 (exc) |
| ivanti | epmm | to 12.8.0.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Input Validation issue in Ivanti EPMM versions before 12.6.1.1, 12.7.0.1, and 12.8.0.1. It allows a remotely authenticated user who has administrative access to execute remote code on the affected system.
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution by an authenticated administrator, which means an attacker could potentially take full control of the affected system, compromise data integrity, confidentiality, and availability.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70