CVE-2023-39335

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to impersonate any existing user during device enrollment in Ivanti EPMM (formerly MobileIron Core). It affects EPMM versions 11.10, 11.9, 11.8 and older, enabling unauthorized access to user accounts and resources.

💻 Affected Systems

Products:
  • Ivanti EPMM (formerly MobileIron Core)
Versions: 11.10, 11.9, 11.8 and older versions
Operating Systems: All supported OS for EPMM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with vulnerable versions, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the EPMM environment, unauthorized access to all managed devices, data exfiltration, and lateral movement to connected enterprise systems.

🟠

Likely Case

Unauthorized device enrollment leading to data theft, privilege escalation, and potential malware deployment on managed devices.

🟢

If Mitigated

Limited impact if network segmentation prevents access to vulnerable systems and strong monitoring detects anomalous enrollment attempts.

🌐 Internet-Facing: HIGH - EPMM servers are often internet-facing for mobile device management, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to gain unauthorized access, but external threat is higher.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation makes this highly attractive to attackers. While no public PoC exists, the vulnerability description suggests straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.10.0.3, 11.9.1.2, and 11.8.1.4

Vendor Advisory: https://forums.ivanti.com/s/article/CVE-2023-39335?language=en_US

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup your EPMM configuration. 3. Apply the patch following Ivanti's upgrade documentation. 4. Restart the EPMM services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to EPMM enrollment endpoints to trusted networks only

Temporary Enrollment Disable

all

Disable new device enrollment if business operations allow

🧯 If You Can't Patch

  • Implement strict network access controls to limit EPMM server exposure
  • Enable detailed logging and monitoring for all enrollment attempts

🔍 How to Verify

Check if Vulnerable:

Check EPMM version in Admin Console > About. If version is 11.10.x (x<0.3), 11.9.x (x<1.2), or 11.8.x (x<1.4), system is vulnerable.

Check Version:

Check via EPMM Admin Console or API endpoint /api/v1/system/info

Verify Fix Applied:

Verify version shows 11.10.0.3, 11.9.1.2, or 11.8.1.4 after patching. Test enrollment with monitoring to ensure no unauthorized impersonation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed enrollment attempts followed by successful enrollment from same IP
  • Enrollment from unusual geolocations or IP ranges
  • User account enrolling devices at unusual times

Network Indicators:

  • Unusual traffic patterns to /enrollment endpoints
  • Multiple enrollment requests from single source in short timeframe

SIEM Query:

source="epmm" AND (event_type="enrollment" OR event_type="device_register") | stats count by src_ip, user | where count > threshold

🔗 References

📤 Share & Export