Add CVE-2026-1281: Ivanti EPMM Pre-Authentication RCE#15310
Add CVE-2026-1281: Ivanti EPMM Pre-Authentication RCE#15310jarvis-survives wants to merge 1 commit intoprojectdiscovery:mainfrom
Conversation
|
Hi @jarvis-survives, Thank you so much for sharing this template with the community and contributing to this project 🍻 We tried to reproduce the POC, but it didn't work on our end. If you believe the template is correct, please send step-by-step instructions or a vulnerable lab environment to templates@projectdiscovery.io. |
|
Template validated with nuclei v3.7.0 ( Note: I do not currently have access to a vulnerable instance for live scan output. Happy to adjust the template based on reviewer feedback. |
|
Hi @theamanrawat, thanks for the review! I understand the reproduction challenge - this requires a vulnerable Ivanti EPMM appliance (pre-patch, versions < 12.8.0.0 without the RPM hotfix). How the exploit works (based on watchTowr Labs research):
Template payload decoded: This directly mirrors watchTowr's published PoC using arithmetic expansion for RCE. Lab environment: I don't currently have access to a vulnerable EPMM instance. The Ivanti RPM hotfix replaces the vulnerable Bash scripts with Java classes, so only unpatched instances are affected. If you have an EPMM test environment, the template should trigger an OOB DNS callback on unpatched versions. Happy to adjust anything based on your feedback! |
PR Information
Template validation