CVE-2023-31224

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication controls in Jamf Pro Server, potentially gaining unauthorized access to administrative functions. It affects organizations using Jamf Pro Server versions before 10.46.1 for Apple device management.

💻 Affected Systems

Products:
  • Jamf Pro Server
Versions: All versions before 10.46.1
Operating Systems: Any OS running Jamf Pro Server
Default Config Vulnerable: ⚠️ Yes
Notes: All Jamf Pro Server deployments before the patched version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Jamf Pro Server, allowing attackers to deploy malicious configurations to all managed Apple devices, steal sensitive organizational data, or disrupt device management operations.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, data exfiltration, or deployment of malicious profiles/payloads to managed devices.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains a critical finding.

🌐 Internet-Facing: HIGH - Jamf Pro Servers exposed to the internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: HIGH - Even internally accessible servers are vulnerable to authenticated users or attackers who gain internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The CWE-287 classification indicates improper authentication, suggesting straightforward exploitation once the specific bypass method is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.46.1 or later (10.47.0 confirmed fixed)

Vendor Advisory: https://learn.jamf.com/bundle/jamf-pro-release-notes-10.47.0/page/Resolved_Issues.html

Restart Required: Yes

Instructions:

1. Backup your Jamf Pro Server database and configuration. 2. Download Jamf Pro 10.46.1 or later from the Jamf Nation portal. 3. Follow the official upgrade guide for your deployment type (on-premises or cloud). 4. Restart the Jamf Pro service after installation.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Jamf Pro Server to only trusted administrative networks and required client communication ports.

Enhanced Monitoring

all

Implement strict logging and alerting for authentication attempts and administrative actions on the Jamf Pro Server.

🧯 If You Can't Patch

  • Implement strict network access controls to limit Jamf Pro Server exposure to only necessary IP ranges
  • Enable comprehensive audit logging and monitor for unusual authentication patterns or administrative actions

🔍 How to Verify

Check if Vulnerable:

Check the Jamf Pro Server version in the web interface (Settings > Global Management > Status) or via API endpoint /api/v1/jamf-pro-version

Check Version:

curl -k -u 'username:password' https://jamf-server/JSSResource/jamfproversion

Verify Fix Applied:

Confirm version is 10.46.1 or higher and test authentication controls with non-admin credentials attempting privileged actions

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful privileged actions from same source
  • Authentication logs showing bypass patterns
  • Administrative actions from non-admin user accounts

Network Indicators:

  • Unusual authentication request patterns to Jamf Pro endpoints
  • Traffic to administrative endpoints from unexpected sources

SIEM Query:

source="jamf-pro.log" (event="AUTH_FAILURE" OR event="AUTH_BYPASS") | stats count by src_ip, user

🔗 References

📤 Share & Export