Ivanti.EPMM.CVE-2023-35078.Authentication.Bypass
Description
This indicates an attack attempt to exploit a Authentication Bypass Vulnerability in Ivanti Endpoint Manager Mobile (EPMM).
The vulnerability is due to insufficient authentication check for user requests to the system's API. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successfully exploiting these vulnerabilities could allow an attacker to obtain PII and other sensitive information.
Outbreak Alert
Ivanti Endpoint Manager Mobile (EPMM, formerly MobileIron Core) contains an authentication bypass vulnerability (CVE-2023-35078) that allows unauthenticated access to specific API paths and a path traversal vulnerability (CVE-2023-35081). An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker can also make other configuration changes including installing software and modifying security profiles on registered devices.
Affected Products
Ivanti Endpoint Manager Mobile (EPMM) up to(including) 11.10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078?language=en_US
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-28 | 25.628 | Default_action:pass:drop |
2023-08-23 | 25.626 | Sig Added |
2023-08-09 | 25.618 |