Dutch Data Protection Authority Breached in Ivanti Zero-Day Attack
#Vulnerabilities

Dutch Data Protection Authority Breached in Ivanti Zero-Day Attack

Privacy Reporter
3 min read

The Dutch Data Protection Authority (AP) has admitted to being breached in a zero-day attack exploiting Ivanti Endpoint Manager Mobile vulnerabilities, with attackers accessing staff personal data including names, emails, and phone numbers.

The Dutch Data Protection Authority (AP), the country's primary data protection regulator, has been caught in the crosshairs of a sophisticated cyber attack that exploited recently disclosed Ivanti vulnerabilities as zero-days. In a remarkable case of regulatory self-reporting, the AP confirmed that attackers accessed personal data belonging to both its staff and employees of the Council for the Judiciary (RVDR) during a breach that occurred on January 29, 2026.

The Attack and Its Scope

The breach involved two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM) software: CVE-2026-1281 and CVE-2026-1340. These vulnerabilities were actively exploited in the wild before patches were available, making them true zero-day exploits. Justice Secretary Arno Rutte and Secretary for Kingdom Relations Eddie van Marum co-authored a letter to the Dutch parliament detailing the incident.

According to the ministers' letter, attackers may have accessed personal data including names, business email addresses, and phone numbers of affected employees. While the exact number of individuals impacted wasn't disclosed, all affected persons have been directly informed about the breach. The self-reporting mechanism followed standard protocol, with the AP reporting to its own data protection officer while investigating the RVDR breach.

The Ivanti Vulnerability Landscape

This incident highlights the growing threat posed by edge device vulnerabilities, particularly those that are internet-facing by design. The UK's National Health Service (NHS) had previously warned about the inherent risks of EPMM devices, noting that they are "internet-facing by design and are highly attractive targets to attackers."

The NHS England National CSOC assessment was particularly prescient, stating that "it is highly likely vulnerabilities discovered in edge devices will continue to be exploited as zero-day vulnerabilities, or shortly after vendor disclosure." This prediction proved accurate as attackers raced to exploit the Ivanti vulnerabilities within hours of their public disclosure.

Industry Response and Mitigation Challenges

Security experts were quick to warn organizations about the severity of these vulnerabilities. Benjamin Harris, CEO at watchTowr, emphasized that simply applying patches would be insufficient for organizations that had exposed vulnerable instances to the internet. His recommendation was stark: organizations should consider compromised infrastructure, tear down affected systems, and initiate comprehensive incident response procedures.

The US Cybersecurity and Infrastructure Security Agency (CISA) validated the severity by adding CVE-2026-1281 to its Known Exploited Vulnerability (KEV) list with a critical CVSS score of 9.8. This rapid addition to the KEV list underscores the immediate threat these vulnerabilities posed to organizations worldwide.

Broader Implications for Government Security

The Dutch government is taking a comprehensive approach to understanding the full scope of the threat. The country's cybersecurity agency (NCSC-NL) is actively monitoring the Ivanti EPMM vulnerabilities and collaborating with partners to identify additional threats. Additionally, the Dutch office of the CIO (CIO Rijk) is examining whether there is a broader risk to the central government infrastructure.

This incident serves as a stark reminder that even organizations responsible for data protection and regulatory compliance are not immune to sophisticated cyber attacks. The fact that the Dutch Data Protection Authority itself fell victim to a breach involving the very type of vulnerabilities it would typically investigate creates an ironic but important lesson about the universal nature of cyber threats.

The breach also raises questions about the security posture of critical government infrastructure and the challenges of securing internet-facing devices that are essential for modern organizational operations. As edge devices become increasingly prevalent in government and enterprise environments, the attack surface continues to expand, creating more opportunities for threat actors to exploit vulnerabilities before they can be patched.

This incident will likely influence how data protection authorities and government agencies approach their own security measures, potentially leading to more stringent internal security protocols and faster response times when vulnerabilities are discovered in critical infrastructure components.

Featured image

Comments

Loading comments...