• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
ivanti releases urgent patch for epmm zero day vulnerability under active

Ivanti Releases Urgent Patch for EPMM Zero-Day Vulnerability Under Active Exploitation

You are here: Home / General Cyber Security News / Ivanti Releases Urgent Patch for EPMM Zero-Day Vulnerability Under Active Exploitation
July 25, 2023

Ivanti is warning people to update their Endpoint Supervisor Mobile (EPMM) cell system management application (previously MobileIron Main) to the most recent version that fixes an actively exploited zero-working day vulnerability.

Dubbed CVE-2023-35078, the issue has been described as a distant unauthenticated API entry vulnerability that impacts presently supported version 11.4 releases 11.10, 11.9, and 11.8 as nicely as older releases. It has the utmost severity score of 10 on the CVSS scale.

“An authentication bypass vulnerability in Ivanti EPMM enables unauthorized buyers to entry restricted functionality or methods of the software without the need of proper authentication,” the enterprise said in a terse advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“If exploited, this vulnerability permits an unauthorized, remote (internet-facing) actor to likely accessibility users’ individually identifiable information and facts and make minimal alterations to the server.”

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said an adversary with entry to the API paths could exploit them to receive personally identifiable details (PII) this kind of as names, phone quantities, and other cell product facts for users on a vulnerable technique.

Upcoming WEBINARShield Versus Insider Threats: Grasp SaaS Security Posture Administration

Concerned about insider threats? We have acquired you coated! Sign up for this webinar to explore useful methods and the insider secrets of proactive security with SaaS Security Posture Management.

Sign up for These days

“An attacker can also make other configuration changes, together with producing an EPMM administrative account that can make even more variations to a susceptible technique,” CISA extra.

The Utah-based IT application company further more said that it truly is mindful of lively exploitation of the bug towards a “very constrained number of clients” but did not disclose added details about the mother nature of the attacks or the identity of the risk actor behind them.

Patches for the issue have been produced offered in versions 11.8.1.1, 11.9.1.1, and 11.10..2, in accordance to security researcher Kevin Beaumont.

Observed this post appealing? Comply with us on Twitter  and LinkedIn to study far more special material we article.


Some elements of this short article are sourced from:
thehackernews.com

Previous Post: «apple rolls out urgent patches for zero day flaws impacting iphones, Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs
Next Post: Atlassian Releases Patches for Critical Flaws in Confluence and Bamboo atlassian releases patches for critical flaws in confluence and bamboo»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.