European Commission Mobile Infrastructure Breached Through Ivanti EPMM Vulnerabilities
The European Commission has confirmed that attackers compromised its central mobile device management systems on January 30, potentially accessing the names and phone numbers of staff members.
The intrusion targeted the infrastructure used to manage employee mobile phones and tablets. CERT-EU detected suspicious activity and contained the breach within nine hours, with the Commission stating that no compromise of individual mobile devices was detected.
Ivanti EPMM Flaws Exploited
Although the Commission did not name the software vendor, the timing aligns directly with Ivanti's January 29 disclosure of two critical vulnerabilities in Endpoint Manager Mobile (EPMM).
CVE-2026-1281 and CVE-2026-1340 are both code injection flaws that allow unauthenticated remote code execution against affected EPMM servers. CISA added CVE-2026-1281 to its Known Exploited Vulnerabilities catalog the same day, with a remediation deadline of February 1.
The attack occurred just one day after Ivanti published its advisory — underscoring how rapidly threat actors are weaponizing newly disclosed vulnerabilities against high-value targets.
Patching Complications
Ivanti has issued interim security patches but has not yet released a comprehensive fix, with a full update expected in the coming months. Security researchers have noted several concerns with the current remediation approach.
The interim patches revert when updating to different EPMM versions, and different patches are required for different software versions. This fragmented approach leaves organizations at elevated risk, particularly those managing complex multi-version deployments.
Ivanti has also released an RPM-based detection tool to help organizations identify signs of compromise related to these specific flaws.
Wider Impact
The European Commission was not the only government body affected. Finland's Valtori agency reported a breach potentially impacting up to 50,000 users, while the Dutch Data Protection Authority also confirmed it was compromised through the same Ivanti vulnerabilities. Shadowserver identified dozens of additional servers worldwide likely affected by the same campaign.
The highly targeted nature of the attacks — focusing on government institutions and regulatory bodies — suggests the threat actors may be operating with political or espionage objectives.
Recommendation
Organizations running Ivanti EPMM should apply available patches immediately, run Ivanti's detection tool to check for signs of compromise, and restrict network access to EPMM management interfaces. Given the fragmented patch situation, defenders should monitor Ivanti's advisories closely for the comprehensive fix and be prepared to re-apply patches after any version updates.