Ivanti is warning people to update their Endpoint Supervisor Mobile (EPMM) cell system management application (previously MobileIron Main) to the most recent version that fixes an actively exploited zero-working day vulnerability.
Dubbed CVE-2023-35078, the issue has been described as a distant unauthenticated API entry vulnerability that impacts presently supported version 11.4 releases 11.10, 11.9, and 11.8 as nicely as older releases. It has the utmost severity score of 10 on the CVSS scale.
“An authentication bypass vulnerability in Ivanti EPMM enables unauthorized buyers to entry restricted functionality or methods of the software without the need of proper authentication,” the enterprise said in a terse advisory.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“If exploited, this vulnerability permits an unauthorized, remote (internet-facing) actor to likely accessibility users’ individually identifiable information and facts and make minimal alterations to the server.”
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said an adversary with entry to the API paths could exploit them to receive personally identifiable details (PII) this kind of as names, phone quantities, and other cell product facts for users on a vulnerable technique.
Upcoming WEBINARShield Versus Insider Threats: Grasp SaaS Security Posture Administration
Concerned about insider threats? We have acquired you coated! Sign up for this webinar to explore useful methods and the insider secrets of proactive security with SaaS Security Posture Management.
Sign up for These days
“An attacker can also make other configuration changes, together with producing an EPMM administrative account that can make even more variations to a susceptible technique,” CISA extra.
The Utah-based IT application company further more said that it truly is mindful of lively exploitation of the bug towards a “very constrained number of clients” but did not disclose added details about the mother nature of the attacks or the identity of the risk actor behind them.
Patches for the issue have been produced offered in versions 11.8.1.1, 11.9.1.1, and 11.10..2, in accordance to security researcher Kevin Beaumont.
Observed this post appealing? Comply with us on Twitter and LinkedIn to study far more special material we article.
Some elements of this short article are sourced from:
thehackernews.com