Features 24.03.2026

AI Autopsy: Ivanti Zero-Day Breaches Put MDM Platforms in the Crosshairs

CISOs must start treating their mobile device management tools as critical control planes

Carly Page explores why it’s time to protect MDM with the same rigour as identity systems

Sixty-second snapshot:

  • Several European public bodies suffered a data breach via exploitation of two critical zero days in Ivanti Endpoint Manager Mobile that allowed attackers to run code remotely without logging in
  • Attackers were able to access mobile device management systems holding staff and device information such as names, contact details and configuration data — which could be useful for reconnaissance and phishing
  • The incidents are a reminder that MDM platforms effectively act as control hubs, meaning a single breach can reveal how users, devices and systems connect across an organisation
  • CISOs must treat MDM platforms as core infrastructure rather than back-office tools, applying the same level of protection used for identity systems
  • Limiting direct internet exposure (eg, by restricting access paths or adding additional network controls) can significantly reduce risk
  • Assume new vulnerabilities will emerge and focus on limiting how far an attacker could move if a system is compromised
  • Fast patching still matters, but so does verifying remediation, including credential resets and system integrity checks
  • Retention policies are also worth revisiting, particularly where old device or enrolment data is kept longer than operationally necessary

When a mobile device management (MDM) platform gets compromised, the damage doesn’t stop at internal IT systems. Edge infrastructure is an increasingly popular target, potentially spilling identity data, operational details and internal trust links in one go. A new threat campaign exploiting two zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) is likely to be just the tip of the iceberg.

What happened and who was affected?

The campaign centres around CVE-2026-1281 and CVE-2026-1340, both of which enable unauthenticated remote code execution. In practice, this meant attackers could gain control of servers that manage fleets of mobile devices without credentials – a worst-case scenario for any organisation relying on centralised device control. There are signs the group may have been a Chinese state-backed entity, although others soon waded in.

Government disclosures show that multiple European public-sector organisations were affected, including the European Commission, Finnish government services provider Valtori, and two Dutch public bodies. In several cases, attackers accessed MDM environments containing employee and device data.

While authorities moved relatively quickly to contain the breaches, the incidents exposed information such as names, contact details, device identifiers, and configuration data – individually trivial, but collectively powerful when used for reconnaissance and follow-on phishing.

Joshua Scarpino, CISO at TrustEngine, describes the incident as more than a typical case of vulnerability exploitation.

“This is not just another zero-day story: it is a governance signal,” he told Assured Intelligence. Data such as names, emails, and device details effectively becomes “reconnaissance intelligence” that can support social engineering, privilege escalation, and longer-term access brokering, Scarpino says.

In Finland, the scale of impact was amplified by the volume of historical data retained in the system, reportedly affecting tens of thousands of government workers. It’s a reminder that retention practices often shape the real scope of a breach long before any exploit occurs.

Why the data matters

MDM platforms sit at the intersection of identity, devices, and policy enforcement, making them uniquely valuable targets. Dean Garvey-North, CTO at Microlise, says threat actors are increasingly targeting the platforms that manage devices rather than the devices themselves.

“This is not just another zero-day story: it is a governance signal” Joshua Scarpino

“These attacks highlight a shift in attacker strategy,” he tells Assured Intelligence, noting that in connected fleets and IoT environments, the exposure can extend beyond data to reveal how physical operations function.

Because these platforms control thousands of endpoints simultaneously, a single compromise can expose operational insight, identity relationships, and enterprise systems at once. In sectors such as logistics and critical infrastructure, stolen device data could be used to map supply chains, identify key personnel, or disrupt operations, says Garvey-North.

In this context, compromise of management infrastructure is no longer just an IT incident but also a potential operational risk.

Edge infrastructure as initial access

Security researchers say attackers began probing exposed EPMM servers almost immediately after Ivanti disclosed the bugs, a reminder of how little time network defenders now have to patch in these situations. It also reflects a wider shift, with edge and management platforms increasingly seen as convenient entry points into corporate networks.

Mike Beevor, CTO of Principle Networks, says the breach reinforces the uncomfortable reality that perfect software doesn’t exist. “The recent exploitation of Ivanti EPMM is a powerful reminder that all code has exploits and always will,” he tells Assured Intelligence.

Rather than focusing solely on endpoint security, Beevor argues that organisations need to rethink trust boundaries. “The Ivanti incident reinforces the reality that any device must be treated as untrusted,” he says, stressing that identity must function as a continuous and adaptive access control layer rather than a one-time authentication event.

He also points to the importance of layered defence and coordinated response, noting that no single control can operate in isolation. The relatively rapid containment at the European Commission reflects the value of rehearsed response processes and operational resilience, Beevor claims.

“Equally critical is cyber resilience,” he continues, highlighting that the commission contained its breach within nine hours. Beevor adds that incidents like this often expose gaps in data governance, particularly when organisations lack clear visibility into the sensitivity and context of their information assets.

Treat MDM as crown-jewel infrastructure

One of the clearest lessons from the incident is an architectural one. Many organisations still treat MDM platforms as operational tools rather than critical control planes.

“This is a powerful reminder that all code has exploits and always will” Mike Beevor

Artur Balabanskyy, founder and CTO of TapForce, says that mindset needs to change, describing MDM infrastructure as effectively part of an organisation’s “digital nervous system”. If attackers gain access, they are not just inside an IT system but inside the mechanisms that enforce identity, device posture, and policy.

“Zero-days are a reality,” he says. “The question is not whether you can prevent them, but whether you can contain them.”

That means treating MDM platforms with the same scrutiny as identity providers, including strict segmentation, least-privilege access and continuous monitoring.

The architecture and retention challenge

The campaign also highlights deeper structural issues around deployment and lifecycle management. “Ivanti EPMM exploitation proves that MDM platforms are initial-access infrastructure, not IT utilities,” Black Duck senior director, Colin Hogue-Spears, tells Assured Intelligence.

Organisations need to rethink threat models across architecture, patching, and data retention. Retention practices in particular can quietly multiply exposure, he adds, claiming that “the EPMM database is a reconnaissance platform, not a filing cabinet.”

Designing for containment, not just prevention

The experts Assured Intelligence spoke to highlight a consistent theme: zero-days are inevitable, and resilience depends on detection speed and containment discipline rather than prevention alone.

“The question is not whether you can prevent zero-days but whether you can contain them” Artur Balabanskyy

Gene Moody, Field CTO at Action1, tells Assured Intelligence that automation is accelerating attacker timelines. “When critical management systems are exposed to the internet and contain remotely exploitable flaws, the time between disclosure and widespread exploitation is extremely short; minutes to hours at best,” he says.

Reducing the external attack surface, accelerating remediation, and improving visibility into administrative infrastructure can materially lower risk, Moody adds.

TrustEngine’s Scarpino says organisations also need to rethink assumptions about internal systems, warning that platforms sitting at the intersection of identity and endpoint control should be treated as foundational infrastructure rather than trusted back-office tools.

“Zero-days are inevitable,” he says. “Detection speed, containment discipline, and auditable data lifecycle controls are not.”

Building resilience into the control plane

The bottom line is that edge and management platforms have quietly become high-value targets. A single compromise can reveal how identities are linked, how systems are operated, and where trust sits across an environment.

Microlise’s Garvey-North says the lesson is ultimately about resilience and continuity. Organisations need to ensure they can detect compromises quickly, isolate affected systems, and continue operating safely even when trusted platforms are breached.

“Being secure by design must be embedded across the organisation from the outset, shaping systems, processes and culture so resilience is built in rather than added later,” he concludes.

Latest articles

Be an insider. Sign up now!