• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers discover bypass for recently patched critical ivanti epmm vulnerability

Researchers Discover Bypass for Recently Patched Critical Ivanti EPMM Vulnerability

You are here: Home / General Cyber Security News / Researchers Discover Bypass for Recently Patched Critical Ivanti EPMM Vulnerability
August 3, 2023

Cybersecurity scientists have discovered a bypass for a just lately fastened actively exploited vulnerability in some variations of Ivanti Endpoint Manager Cell (EPMM), prompting Ivanti to issue a new spherical of patches.

Tracked as CVE-2023-35082 (CVSS score: 10.) and found out by Fast7, the issue “makes it possible for unauthenticated attackers to access the API in older unsupported versions of MobileIron Core (11.2 and below).”

“If exploited, this vulnerability enables an unauthorized, distant (internet-experiencing) actor to probably entry users’ personally identifiable information and make constrained adjustments to the server,” Ivanti reported in an advisory released on August 2, 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Rapid7 security researcher Stephen Fewer explained, “CVE-2023-35082 occurs from the very same spot as CVE-2023-35078, specially the permissive nature of sure entries in the mifs web application’s security filter chain.”

With the hottest disclosure, Ivanti has patched a full of 3 security flaws impacting its EPMM item in quick succession inside of a span of two weeks.

Cybersecurity

It also arrives as cybersecurity organizations from Norway and the U.S. disclosed that CVE-2023-35078 and CVE-2023-35081 have been exploited by unnamed country-state groups at the very least since April 2023 to drop web shells and gain persistent distant access to compromised techniques.

  • CVE-2023-35078 (CVSS score: 10.) – An authentication bypass vulnerability in Ivanti EPMM will allow unauthorized end users to obtain restricted performance or sources of the software devoid of right authentication.
  • CVE-2023-35081 (CVSS rating: 7.2) – A route traversal vulnerability is found in Ivanti EPMM that makes it possible for an attacker to create arbitrary documents onto the equipment.

Even though there is no evidence of active exploitation of CVE-2023-35082 in the wild, it’s recommended that users up grade to the most up-to-date supported version to secure in opposition to possible threats.

“MobileIron Core 11.2 has been out of aid considering that March 15, 2022,” Ivanti stated. “Consequently, Ivanti will not be issuing a patch or any other remediations to deal with this vulnerability in 11.2 or earlier versions.”

Found this write-up attention-grabbing? Stick to us on Twitter  and LinkedIn to study extra special content material we article.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «russian cyber adversary bluecharlie alters infrastructure in response to disclosures Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures
Next Post: Microsoft Exposes Russian Hackers’ Sneaky Phishing Tactics via Microsoft Teams Chats microsoft exposes russian hackers' sneaky phishing tactics via microsoft teams»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.