US-based IT software company Ivanti has patched an actively exploited zero-day authentication bypass vulnerability impacting its Endpoint Manager Mobile (EPMM) mobile device management software (formerly MobileIron Core).
Ivanti released security patches for the remote unauthenticated API access vulnerability tracked as CVE-2023-35078 on Sunday.
The patches can be installed by upgrading to EPMM 184.108.40.206, 220.127.116.11, and 18.104.22.168. They also target unsupported and end-of-life software versions lower than 22.214.171.124 (e.g., 126.96.36.199, 188.8.131.52)
While Ivanti has published a security advisory to provide details on the security vulnerability, the information is being blocked by a login, given that the article can only be accessed with an account linked to Ivanti customer information.
“An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication,” Ivanti says in the security advisory .
“This vulnerability impacts all supported versions 11.10, 11.9, and 11.8. Older versions/releases are also at risk. An unauthorized, remote (internet-facing) actor can access users’ personally identifiable information and can allow limited changes to the server.”
Already exploited by attackers in the wild
After news of the vulnerability circulated among the cybersecurity community, security expert Kevin Beaumont warned that admins should apply the patches as soon as possible due to the ease of exploitation.
While the company has not publicly admitted that the zero-day was actively exploited, the private bulletin says that a “trusted source” informed Ivanti that CVE-2023-35078 was exploited in attacks against a limited number of customers.
“We have received information from a credible source indicating exploitation against a very small number of customers (e.g., less than 10). We do not have more information the share at this time,” the private advisory reads.
Ivanti added that the bug is not being exploited as part of a supply chain attack, saying that it didn’t find “any indication that this vulnerability was introduced into our code development process maliciously.”
Some customers have also reported that Ivanti asked them to sign non-disclosure agreements when asking for more information regarding the CVE-2023-35078 vulnerability.
As per Ivanti – “We immediately developed and released a patch and are actively engaging with customers to help them apply the fix.”
According to a Shodan search shared by PwnDefend Cyber Security Consultant Daniel Card, over 2,900 MobileIron user portals are exposed online, with three dozen linked to U.S. local and state government agencies.
Most exposed servers are in the United States, followed by Germany, the United Kingdom, and Hong Kong.
All network admins are strongly advised to apply the Ivanti Endpoint Manager Mobile (MobileIron) patches as soon as possible.