Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Ivanti EPMM Zero-Days Breach Dutch, EU, and Finnish
Ivanti EPMM Zero-Days Breach Dutch, EU, and Finnish

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-1281

Ivanti EPMM Zero-Days Breach Dutch, EU, and Finnish

Two critical Ivanti Endpoint Manager Mobile zero-days with CVSS 9.8 were exploited to breach the Dutch Data Protection Authority, European Commission, and...

Dylan H.

Security Team

February 16, 2026
5 min read

Affected Products

  • Ivanti EPMM (on-premises) < 12.8.0.0
  • Ivanti EPMM In-House App Distribution
  • Ivanti EPMM Android File Transfer

Executive Summary

Two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) — CVE-2026-1281 and CVE-2026-1340, both rated CVSS 9.8 — have been actively exploited to breach multiple European government agencies. Confirmed victims include the Dutch Data Protection Authority, the Dutch Council for the Judiciary, the European Commission, and Finland's Valtori (state ICT provider serving up to 50,000 government employees).

Researchers have also discovered "sleeper" webshells planted by attackers for long-term persistent access.


Vulnerability Details

CVE-2026-1281 — Code Injection via In-House App Distribution

FieldDetails
CVECVE-2026-1281
CVSS9.8 (Critical)
TypeCode injection via Bash arithmetic expansion
ComponentEPMM In-House App Distribution
AuthenticationNone required
ImpactUnauthenticated remote code execution

The vulnerability exploits Bash arithmetic expansion in EPMM's file delivery mechanism, allowing an unauthenticated attacker to inject and execute arbitrary commands on the server.

CVE-2026-1340 — Code Injection via Android File Transfer

FieldDetails
CVECVE-2026-1340
CVSS9.8 (Critical)
TypeCode injection
ComponentEPMM Android File Transfer
AuthenticationNone required
ImpactUnauthenticated remote code execution

Confirmed Victims

OrganizationCountryImpact
Dutch Data Protection Authority (AP)NetherlandsSystems compromised, investigation ongoing
Dutch Council for the JudiciaryNetherlandsCourt system infrastructure breached
European CommissionEUInstitutional systems accessed
Valtori (State ICT Provider)FinlandUp to 50,000 government employees' work details potentially exposed

Attack Timeline

Jan 29, 2026    — First confirmed exploitation activity
Jan 31, 2026    — Ivanti notified of active exploitation
Feb 1, 2026     — CISA deadline for federal agencies to apply mitigations
Feb 3, 2026     — Temporary RPM patches released
Feb 7, 2026     — Dutch authorities confirm breaches
Feb 11, 2026    — Researchers discover "sleeper" webshells
Feb 14, 2026    — Finnish government confirms Valtori breach

Exploitation Activity

Scale

GreyNoise tracked exploitation activity from:

  • 8 distinct IP addresses across 417 exploitation sessions
  • 83% of all exploitation attempts traced to a single bulletproof hosting IP
  • Activity began January 29 — before patches were available

Sleeper Webshells

Security researchers from Help Net Security discovered that attackers planted webshells designed for long-term persistent access:

  • Webshells disguised as legitimate EPMM system files
  • Dormant until activated by specific request parameters
  • Survived temporary RPM patches in some cases
  • Designed to re-establish access even after patching

This means organizations that patched but did not conduct thorough forensic investigations may still be compromised.


Affected Systems

VersionStatus
On-premises EPMM < 12.8.0.0Vulnerable
Cloud Neurons for MDMNot affected
EPMM 12.8.0.0+Fixed

Important: Only on-premises EPMM installations are affected. Ivanti's cloud-hosted Neurons for MDM is not vulnerable.


Remediation

Immediate Steps

  1. Apply RPM patches from Ivanti immediately (temporary fix)
  2. Upgrade to EPMM 12.8.0.0 when available (full fix, Q1 2026)
  3. Conduct forensic investigation — Patching alone is insufficient due to sleeper webshells

Post-Patch Investigation

  • Search for webshells — Check for unexpected files in EPMM web directories
  • Review authentication logs — Look for unauthenticated access to In-House App and Android File Transfer endpoints
  • Check for persistence — Inspect cron jobs, scheduled tasks, and startup scripts
  • Monitor outbound connections — Look for C2 traffic from the EPMM server
  • Rotate credentials — Change all credentials accessible from the EPMM server

Network Mitigations

  • Restrict EPMM management interface access to trusted networks only
  • Implement WAF rules to block exploitation attempts
  • Monitor for the 8 known exploitation IP addresses

Context: Ivanti's Ongoing Security Challenges

Ivanti products have been a frequent target of state-sponsored actors:

DateProductCVE(s)Impact
Jan 2024Connect SecureCVE-2024-21887CISA emergency directive, global exploitation
Oct 2024Cloud Service ApplianceCVE-2024-8963Active exploitation
Jan 2026Connect SecureMultipleCISA emergency directive
Feb 2026EPMMCVE-2026-1281/1340EU government breaches

Organizations using Ivanti products should maintain heightened vigilance and rapid patching capabilities.


References

  • The Hacker News — Dutch Authorities Confirm Ivanti Zero-Day Exploit
  • The Record — EU, Dutch Government Announce Hacks Following Ivanti Zero-Days
  • GreyNoise — Active Ivanti Exploitation
  • Help Net Security — Ivanti EPMM Sleeper Webshells
  • Tenable — CVE-2026-1281 CVE-2026-1340 Ivanti EPMM Zero-Day
  • Rapid7 — Critical Ivanti EPMM Zero-Day Exploited in the Wild
#Ivanti#EPMM#Zero-Day#Government Breach#Netherlands#EU#Finland#CVE-2026-1281#CVE-2026-1340

Related Articles

CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

A maximum-severity authentication bypass in Cisco Catalyst SD-WAN (CVE-2026-20127, CVSS 10.0) has been actively exploited by threat actor UAT-8616 since...

4 min read

Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes

A CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN has been exploited since at least 2023. CISA issues Emergency Directive ED 26-03 as all Five...

3 min read

Microsoft Office Word OLE Security Feature Bypass

An actively exploited zero-day in Microsoft Word allows attackers to bypass OLE protections and execute malicious Office documents silently, without...

5 min read
Back to all Security Alerts