Brief Summary: CVE-2026-5786 Improper Access Control in Ivanti EPMM Enables Authenticated Privilege Escalation to Admin

A short review of CVE-2026-5786, a high severity improper access control flaw in Ivanti Endpoint Manager Mobile that allows any authenticated user to escalate to administrative privileges. Includes patch details and affected version information.

CVE Analysis

7 min read

ZeroPath CVE Analysis
ZeroPath CVE Analysis

2026-05-07

Brief Summary: CVE-2026-5786 Improper Access Control in Ivanti EPMM Enables Authenticated Privilege Escalation to Admin
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Any authenticated user on an Ivanti Endpoint Manager Mobile appliance can silently escalate their privileges to full administrative control, thanks to an improper access control flaw disclosed on May 7, 2026. For organizations relying on EPMM to manage their mobile device fleet, this vulnerability (scored CVSS 8.8) means that a single compromised standard user account could give an attacker the keys to the entire MDM infrastructure, including device policies, configurations, and integrations.

Ivanti Endpoint Manager Mobile is an on premises mobile device management platform used by enterprises and government agencies to enforce security policies and manage mobile endpoints at scale. The product sits at a critical juncture in enterprise infrastructure, controlling what devices can access corporate resources and how they are configured.

Technical Information

CVE-2026-5786 is classified under CWE-284 (Improper Access Control). The CVSS 3.1 vector as reported by the Centre for Cybersecurity Belgium is AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This tells us the vulnerability is network exploitable, requires low attack complexity, requires only low privileges (any authenticated user), requires no user interaction, and carries high impact across confidentiality, integrity, and availability.

Root Cause

The core issue is a failure in access control enforcement within the EPMM appliance. Authenticated sessions with low privilege levels were able to reach administrative functionality that should have been restricted to admin roles only. Because EPMM is a closed source commercial product, no source level code diffs or commit details are publicly available, but the patch description confirms that the fix tightens access control enforcement so that low privilege authenticated sessions can no longer reach administrative functionality.

Attack Flow

Based on the available information, exploitation proceeds through the following steps:

  1. The attacker obtains or already possesses valid credentials for any user account on the target EPMM appliance. This could be a standard, non administrative account.
  2. The attacker authenticates to the EPMM instance remotely over the network.
  3. Due to the improper access control, the attacker accesses administrative functionality that their privilege level should not permit.
  4. The attacker gains full administrative access to the EPMM appliance, which controls policies, configurations, and integrations for the entire managed mobile device fleet.

Scope Boundaries

This vulnerability is strictly limited to the on premises Endpoint Manager Mobile product. Ivanti confirmed that it does not affect Ivanti Neurons for MDM (their cloud based unified endpoint management solution), Ivanti EPM, Ivanti Sentry, or any other Ivanti products.

The May 2026 advisory addressed four other high severity vulnerabilities alongside CVE-2026-5786. The interplay between these is worth understanding:

VulnerabilityAuthentication RequiredExploited at DisclosurePrimary ImpactNotes
CVE-2026-5786Yes (any user)NoAdministrative accessImproper Access Control
CVE-2026-5787YesNoImpersonate Sentry hostsHigh severity
CVE-2026-5788NoNoInvoke arbitrary methodsImproper Access Control
CVE-2026-6973Yes (Admin)YesArbitrary code executionImproper Input Validation
CVE-2026-7821NoNoAccess restricted informationRequires Apple Device Enrollment

The chaining potential here is significant. CVE-2026-5786 provides a privilege escalation path from any authenticated user to admin, and CVE-2026-6973 provides code execution from an admin context. Combined, these would allow any authenticated user to achieve remote code execution on the appliance.

Patch Information

On May 7, 2026, Ivanti published a security advisory addressing CVE-2026-5786 alongside four other high severity vulnerabilities. The fix is delivered through full version updates, not through the temporary RPM script mechanism that was used for the January 2026 EPMM vulnerabilities (CVE-2026-1281 and CVE-2026-1340). This is an important distinction: the new releases are permanent, integrated fixes.

The patch tightens access control enforcement so that low privilege authenticated sessions can no longer reach administrative functionality.

Ivanti released three fixed versions, each corresponding to a supported major release branch:

Affected VersionsFixed VersionBuild
EPMM 12.8.0.0 and prior12.8.0.1217
EPMM 12.7.x12.7.0.1216
EPMM 12.6.x12.6.1.1209

For each fixed version, Ivanti provides both a fresh install ISO and an in place appliance update package available through their download portal (login required). For example, version 12.8.0.1 is available as mobileiron-12.8.0.1-217.iso for new instances and as an update directory for existing appliances.

A notable consolidation benefit: organizations that upgrade to any of these resolved versions also receive the permanent fixes for the critical January 2026 zero days (CVE-2026-1281 and CVE-2026-1340). The temporary RPM packages distributed in January are no longer needed after updating.

Because EPMM is a closed source commercial product, no source level code diffs or commit details are publicly available. The patch is applied entirely through Ivanti's proprietary update mechanism.

Affected Systems and Versions

The vulnerability affects the following Ivanti Endpoint Manager Mobile versions:

  • EPMM versions prior to 12.8.0.1 on the 12.8.x branch
  • EPMM versions prior to 12.7.0.1 on the 12.7.x branch
  • EPMM versions prior to 12.6.1.1 on the 12.6.x branch

Only the on premises deployment of Endpoint Manager Mobile is affected. The following products are explicitly not affected:

  • Ivanti Neurons for MDM (cloud based)
  • Ivanti EPM (Endpoint Manager, the non mobile product)
  • Ivanti Sentry
  • All other Ivanti products

Vendor Security History

Ivanti infrastructure has been a recurring target for advanced threat actors, and the pattern is worth reviewing:

YearProductIncident ContextKey Lesson
2021Pulse Connect SecureBreached by suspected state backed hackers targeting government agencies and defense companiesEdge devices are high value targets
Jan 2026Endpoint Manager MobileWidespread zero day exploitation of CVE-2026-1281 and CVE-2026-1340 with web shells and backdoors deployedRapid patching is critical
May 2026Endpoint Manager MobileCVE-2026-6973 exploited using credentials stolen from January 2026 incidentsCredential rotation must accompany patches

The May 2026 situation is particularly instructive. Ivanti has high confidence that the administrative credentials used to exploit CVE-2026-6973 were harvested during the January 2026 zero day campaign. This demonstrates that patching alone is insufficient when credentials may have been compromised; rotation is a necessary companion step.

References

Detect & fix
what others miss

Security magnifying glass visualization