CVE-2023-35082

9.8 CRITICAL

📋 TL;DR

CVE-2023-35082 is an authentication bypass vulnerability in Ivanti EPMM (formerly MobileIron Core) that allows remote unauthenticated attackers to access administrative API endpoints. This affects Ivanti EPMM 11.10 and older versions, potentially enabling attackers to compromise the entire mobile device management system.

💻 Affected Systems

Products:
  • Ivanti EPMM
  • MobileIron Core
Versions: 11.10 and older
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability is distinct from CVE-2023-35078 but affects similar versions. All default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to deploy malicious configurations to managed mobile devices, steal sensitive corporate data, and pivot to internal networks.

🟠

Likely Case

Unauthorized access to administrative functions, configuration changes, and potential data exfiltration from the EPMM system.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and strong authentication controls are in place for internal users.

🌐 Internet-Facing: HIGH - This vulnerability allows remote unauthenticated exploitation, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, any user with network access could exploit this without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.11 or later

Vendor Advisory: https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older

Restart Required: Yes

Instructions:

1. Download Ivanti EPMM 11.11 or later from the Ivanti support portal. 2. Backup current configuration. 3. Apply the patch following Ivanti's upgrade documentation. 4. Restart the EPMM service. 5. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to EPMM management interfaces to trusted IP addresses only

Web Application Firewall Rules

all

Implement WAF rules to block suspicious API requests to EPMM endpoints

🧯 If You Can't Patch

  • Immediately isolate the EPMM server from internet access and restrict internal network access
  • Implement strict network monitoring and alerting for any unauthorized access attempts to EPMM APIs

🔍 How to Verify

Check if Vulnerable:

Check the EPMM version via the admin interface or by examining the application files. Versions 11.10 and below are vulnerable.

Check Version:

Check the admin interface or review the application version in the EPMM installation directory

Verify Fix Applied:

Verify the version is 11.11 or later and test that unauthenticated API access to administrative endpoints is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to administrative endpoints
  • Unusual authentication bypass patterns in access logs
  • Multiple failed authentication attempts followed by successful API access

Network Indicators:

  • Unusual traffic patterns to EPMM API endpoints from unauthenticated sources
  • HTTP requests to administrative APIs without proper authentication headers

SIEM Query:

source="epmm" AND (http_method="POST" OR http_method="GET") AND uri_path="/api/*" AND NOT auth_status="successful"

🔗 References

📤 Share & Export