iTnews Asia
  • Home
  • News
  • Security

Ivanti endpoint security needs security upgrade

Ivanti endpoint security needs security upgrade

Older MobileIron appliances had exploitable API.

By Richard Chirgwin on Aug 3, 2023 2:40PM

Ivanti, which last week had to move on a vulnerability in its Endpoint Manager Mobile (EMM) product, has disclosed a new bug in the product.

As detailed by Rapid7, CVE-2023-35082 acts as a bypass for a patch in the previously-released CVE-2023-35078.

Both are vulnerabilities in access to the EMM (formerly Mobileiron Core) API, allowing unauthorised, remote attackers to access users’ personal information and “make limited changes to the server”, Ivanti’s notice states.

The latest vulnerability has a CVSS score of 10, the maximum possible.

Since the affected versions, Mobileiron 11.2 and prior, are out of support, Ivanti recommends affected users upgrade to the latest version of EMM.

Rapid7 said the vulnerability arises because a web application on the appliance had "permissive" entries in its security filter chain.

The vulnerability lets an attacker access the API endpoints on an exposed management server, Rapid7 said. 

“An attacker can use these API endpoints to perform a multitude of operations as outlined in the official API documents, including the ability to disclose personally identifiable information (PII) and perform modifications to the platform."

A previously-patched bug, CVE-2023-35081, has a lower CVSS score of 7.2 – but it allows an authenticated attacker to write malicious files to the appliance.

Rapid7 explained: “CVE-2023-35081 could be chained with CVE-2023-35082 to allow an attacker to write malicious webshell files to the appliance, which may then be executed by the attacker.”

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
ivanti mobileiron rapid7 security

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.