• Language chooser
    • USA (English)
    • France (Français)

Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability

Released: Aug 10, 2023

Updated: Aug 10, 2023


High Severity

Ivanti Vendor

Vulnerability, Attack Type


Zero-day vulnerabilities exploited in the wild

Ivanti Endpoint Manager Mobile (EPMM, formerly MobileIron Core) contains an authentication bypass vulnerability (CVE-2023-35078) that allows unauthenticated access to specific API paths and a path traversal vulnerability (CVE-2023-35081). An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker can also make other configuration changes including installing software and modifying security profiles on registered devices. Learn More »

Common Vulnerabilities and Exposures

CVE-2023-35081
CVE-2023-35078

Background

Ivanti Endpoint Manager Mobile (EPMM) is a software used to manage endpoints running specifically mobile devices running on iOS, Android etc. Successful exploitation could lead to various security risks, including but not limited to: -Unauthorized access to sensitive information stored within Ivanti EPMM -Unauthorized administrative actions, compromising the integrity and availability of the data and resources -Unintended disclosure of confidential data

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


July 24, 2023: The Norwegian National Security Authority (NSM) has confirmed that attackers used a zero-day vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) solution to breach a software platform used by 12 ministries in the country.

July 31, 2023: CISA issued an advisory regarding the vulnerability, and add the vulnerabilities into their Known Exploited Vulnerabilities (KEV) list.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-213a


In response to the identified vulnerabilities, Ivanti has released patches for versions 11.8.1.1, 11.9.1.1, and 11.10.0.
CVE-2023-35081: https://forums.ivanti.com/s/article/KB-Arbitrary-File-Write-CVE-2023-35081
CVE-2023-35078: https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078


Aug 8, 2023: FortiGuard Labs released IPS signature to address the vulnerability (CVE-2023-35078) and detect any attack attempts. IPS signature for the vulnerability (CVE-2023-35081) is currenlty being investigated. It is strongly recommended to apply patches as per vendor notes.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • AV

  • AV (Pre-filter)

  • IPS

  • Web App Security

DETECT
  • Outbreak Detection

  • Threat Hunting

  • Content Update

RESPOND
  • Assisted Response Services

  • Automated Response

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Attack Surface Hardening

  • Business Reputation

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Indicator List
Indicator Type Status
78.128.113.34 ip Active
185.154.53.140 ip Active
185.221.154.208 ip Active
78.128.113.130 ip Active
45.79.204.100 ip Active
190.2.131.204 ip Active
oast.live domain Active
oast.site domain Active
185.122.204.197 ip Active
192.241.235.32 ip Active
103.42.52.219 ip Active
103.42.52.222 ip Active
103.42.52.234 ip Active
103.42.52.247 ip Active
143.198.148.15 ip Active
143.244.47.100 ip Active
146.190.163.154 ip Active
172.104.134.108 ip Active
173.61.91.113 ip Active
179.43.175.7 ip Active
181.229.47.32 ip Active
192.46.239.48 ip Active
201.13.112.146 ip Active
34.231.20.223 ip Active
37.19.207.89 ip Active
45.15.158.124 ip Active
142.93.115.146 ip Active
31.42.185.129 ip Active
195.123.240.183 ip Active
195.123.240.183:443 ip Active
23.92.29.148 ip Active
143.42.30.130 ip Active
143.42.30.137 ip Active
143.42.30.165 ip Active
194.87.254.160 ip Active
92.255.110.4 ip Active
190.2.131.204:8443 ip Active
195.123.240.183:4444 ip Active
23.92.29.148:443 ip Active
34.77.65.112:36866 ip Active
34.77.65.112:4444 ip Active
34.77.65.112:8433 ip Active
45.15.158.124:9995 ip Active
6935a8d379e086ea1aed159b8abcb0bc8acf220bd1cbc0a... file Active
78.128.113.130:443 ip Active
aelix.xyz domain Active
cjjovo7mhpt7geo8aqlgxp7ypod6dqaiz.oast.site domain Active
cjk45q1chpqflh938kughtrfzgwiofns3.oast.site domain Active
http://195.123.240.183/TxPortMap url Active
vocaltube.ru domain Active
122.161.66.161 ip Active
122.161.66.161:8443 ip Active
140.228.24.160 ip Active
140.228.24.160:8443 ip Active
45.159.248.179 ip Active
45.159.248.179:8443 ip Active
45.86.162.147 ip Active
45.86.162.147:4444 ip Active
Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0