UPDATe (8/1/2023):
Last week, Avertium published a flash notice regarding CVE-2023-35078 – an authentication bypass zero-day vulnerability found in Ivanti’s Endpoint Manager Mobile (EPMM). This week, a second zero-day vulnerability (CVE-2023-35081) was discovered in EPMM. The new zero-day is a remote arbitrary file write vulnerability and could allow attackers to remotely create, modify, or delete files in the EPMM server.
Ivanti's advisory states that the vulnerability is different from the original zero-day (CVE-2023-35078) and affects all supported versions/releases: 1.10, 11.9, and 11.8. Older versions/releases are also at risk. If someone successfully exploits this vulnerability, they can use it to create harmful files on the device. This could allow a malicious person to run operating system commands on the device, pretending to be the "tomcat" user. CVE-2023-35081 has a lower CVSS score of 7.2 because an attacker needs administrative privileges to exploit it. As of now, Ivanti is only aware of a limited number of customers impacted by the vulnerability. Please find Avertium's updated recommendations for patch guidance for CVE-2023-35081 below.
overview
The IT giant, Ivanti has issued a security advisory regarding CVE-2023-35078 (also known as MobileIron) – an authentication bypass vulnerability impacting its widely used Endpoint Manager Mobile. The vulnerability has been exploited in zero-day attacks and impacts versions 11.10, 11.9, and 11.8, as well as older end-of-life installations of the software.
Successful exploitation of this flaw allows unauthenticated attackers to remotely access specific API paths, compromising personally identifiable information (PII), such as names, phone numbers, and mobile device details. Additionally, attackers can make configuration changes on compromised devices, including creating administrative accounts, granting them further control over vulnerable systems.
Although Ivanti has not publicly released indicators of compromise (IOCs), security experts believe that threat actors can quickly develop their own exploits using the information on the vulnerable endpoint, escalating the attacks. Ivanti has released a patch to address CVE-2023-35078 but has received criticism as the company initially took down its public advisory regarding the issue, placing it behind a paywall instead. The customer information in the advisory can only be accessed if you have an account.
All network administrators using Ivanti's Endpoint Manager Mobile must take immediate action and upgrade to the latest version of the product. CVE-2023-35078 has a CVSS score of 10 and will be heavily exploited as the weeks move forward. So far, 12 government agencies in Norway have been breached and the Cybersecurity and Infrastructure Security Agency (CISA) has advised that all U.S. federal agencies secure their systems by August 15, 2023. Most of the servers at risk are within the U.S, Germany, the United Kingdom, and Hong Kong.
INDICATORS OF COMPROMISE (IoCs)
At this time, there are no known IoCs associated with CVE-2023-35078 or CVE-2023-35081. Avertium remains vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
SUPPORTING DOCUMENTATION
CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability (ivanti.com)
Norway says Ivanti zero-day was used to hack govt IT systems (bleepingcomputer.com)
Ivanti Releases Security Updates for Endpoint Manager Mobile (EPMM) CVE-2023-35078 | CISA
Ivanti urges customers to apply patch for exploited MobileIron vulnerability (therecord.media)
Ivanti patches MobileIron zero-day bug exploited in attacks (bleepingcomputer.com)
CVE-2023-35081 - Remote Arbitrary File Write (ivanti.com)
Ivanti fixes second zero-day exploited by attackers (CVE-2023-35081) - Help Net Security
Ivanti Patches Second Zero Day in Mobile Management Software | Decipher (duo.com)