Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
UPDATe (8/1/2023):
Last week, Avertium published a flash notice regarding CVE-2023-35078 – an authentication bypass zero-day vulnerability found in Ivanti’s Endpoint Manager Mobile (EPMM). This week, a second zero-day vulnerability (CVE-2023-35081) was discovered in EPMM. The new zero-day is a remote arbitrary file write vulnerability and could allow attackers to remotely create, modify, or delete files in the EPMM server.
Ivanti's advisory states that the vulnerability is different from the original zero-day (CVE-2023-35078) and affects all supported versions/releases: 1.10, 11.9, and 11.8. Older versions/releases are also at risk. If someone successfully exploits this vulnerability, they can use it to create harmful files on the device. This could allow a malicious person to run operating system commands on the device, pretending to be the "tomcat" user. CVE-2023-35081 has a lower CVSS score of 7.2 because an attacker needs administrative privileges to exploit it. As of now, Ivanti is only aware of a limited number of customers impacted by the vulnerability. Please find Avertium's updated recommendations for patch guidance for CVE-2023-35081 below.
overview
The IT giant, Ivanti has issued a security advisory regarding CVE-2023-35078 (also known as MobileIron) – an authentication bypass vulnerability impacting its widely used Endpoint Manager Mobile. The vulnerability has been exploited in zero-day attacks and impacts versions 11.10, 11.9, and 11.8, as well as older end-of-life installations of the software.
Successful exploitation of this flaw allows unauthenticated attackers to remotely access specific API paths, compromising personally identifiable information (PII), such as names, phone numbers, and mobile device details. Additionally, attackers can make configuration changes on compromised devices, including creating administrative accounts, granting them further control over vulnerable systems.
Although Ivanti has not publicly released indicators of compromise (IOCs), security experts believe that threat actors can quickly develop their own exploits using the information on the vulnerable endpoint, escalating the attacks. Ivanti has released a patch to address CVE-2023-35078 but has received criticism as the company initially took down its public advisory regarding the issue, placing it behind a paywall instead. The customer information in the advisory can only be accessed if you have an account.
All network administrators using Ivanti's Endpoint Manager Mobile must take immediate action and upgrade to the latest version of the product. CVE-2023-35078 has a CVSS score of 10 and will be heavily exploited as the weeks move forward. So far, 12 government agencies in Norway have been breached and the Cybersecurity and Infrastructure Security Agency (CISA) has advised that all U.S. federal agencies secure their systems by August 15, 2023. Most of the servers at risk are within the U.S, Germany, the United Kingdom, and Hong Kong.
INDICATORS OF COMPROMISE (IoCs)
At this time, there are no known IoCs associated with CVE-2023-35078 or CVE-2023-35081. Avertium remains vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
SUPPORTING DOCUMENTATION
CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability (ivanti.com)
Norway says Ivanti zero-day was used to hack govt IT systems (bleepingcomputer.com)
Ivanti Releases Security Updates for Endpoint Manager Mobile (EPMM) CVE-2023-35078 | CISA
Ivanti urges customers to apply patch for exploited MobileIron vulnerability (therecord.media)
Ivanti patches MobileIron zero-day bug exploited in attacks (bleepingcomputer.com)
CVE-2023-35081 - Remote Arbitrary File Write (ivanti.com)
Ivanti fixes second zero-day exploited by attackers (CVE-2023-35081) - Help Net Security
Ivanti Patches Second Zero Day in Mobile Management Software | Decipher (duo.com)