CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability - A vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. This vulnerabilit…::<span style="font-size: 11pt;"><span style="line-height: 107%;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;">A vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. This vulnerability impacts all supported versions – Version 11.4 releases 11.10, 11.9 and 11.8. Older versions/releases are also at risk.</span><br><br><span style="font-family: "Arial",sans-serif;"><span style="color: black;">If exploited, this vulnerability enables an unauthorized, remote (internet-facing) actor to potentially access users’ personally identifiable information and make limited changes to the server.</span></span></span></span></span><br><span style="font-size: 11pt;"><span style="line-height: 107%;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;"><span style="color: black;">We have received information from a credible source indicating exploitation has occurred.</span></span><span style="font-family: "Arial",sans-serif;"><span style="color: black;"> We continue to work with our customers and partners to investigate this situation. </span></span> <br><br><span style="font-family: "Arial",sans-serif;"><span style="color: black;">We are only aware of a very limited number of customers that have been impacted. We are actively working with our customers and partners to investigate this situation. </span></span>   </span></span></span><br><span style="font-size: 11pt;"><span style="line-height: 107%;"><span style="font-family: Calibri,sans-serif;">  </span></span></span><br>  <table class="MsoTable15Grid2Accent3" style="border-collapse: collapse;border: none;"><tbody><tr><td colspan="1" rowspan="1" valign="top" style="border-bottom: 2px solid #c9c9c9;width: 73px;padding: 0in 7px 0in 7px;background-color: white;border-top: none;border-right: none;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-family: "Arial",sans-serif;"><span style="color: black;">CVE</span></span></b></span></span></span></td><td colspan="1" rowspan="1" valign="top" style="border-bottom: 2px solid #c9c9c9;width: 209px;padding: 0in 7px 0in 7px;background-color: white;border-top: none;border-right: none;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-family: "Arial",sans-serif;"><span style="color: black;">Description</span></span></b></span></span></span></td><td colspan="1" rowspan="1" valign="top" style="border-bottom: 2px solid #c9c9c9;width: 53px;padding: 0in 7px 0in 7px;background-color: white;border-top: none;border-right: none;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-family: "Arial",sans-serif;"><span style="color: black;">CVSS</span></span></b></span></span></span></td><td colspan="1" rowspan="1" valign="top" style="border-bottom: 2px solid #c9c9c9;width: 289px;padding: 0in 7px 0in 7px;background-color: white;border-top: none;border-right: none;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><b><span style="font-family: "Arial",sans-serif;"><span style="color: black;">Vector</span></span></b></span></span></span></td></tr><tr><td colspan="1" rowspan="1" valign="top" style="border-bottom: 1px solid #c9c9c9;width: 73px;padding: 0in 7px 0in 7px;background-color: #ededed;border-top: none;border-right: 1px solid #c9c9c9;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><b><span style="color: black;"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35078&quot; style="color: blue;text-decoration: underline;" target="_blank"><span style="font-family: "Arial",sans-serif;"><span style="font-weight: normal;">CVE-2023-35078</span></span></a></span></b></span></span></span></td><td colspan="1" rowspan="1" valign="top" style="border-bottom: 1px solid #c9c9c9;width: 209px;padding: 0in 7px 0in 7px;background-color: #ededed;border-top: none;border-right: 1px solid #c9c9c9;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;"><span style="color: black;">An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.</span></span></span></span></span></td><td colspan="1" rowspan="1" valign="top" style="border-bottom: 1px solid #c9c9c9;width: 53px;padding: 0in 7px 0in 7px;background-color: #ededed;border-top: none;border-right: 1px solid #c9c9c9;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;"><span style="color: black;">10.0</span></span></span></span></span></td><td colspan="1" rowspan="1" valign="top" style="border-bottom: 1px solid #c9c9c9;width: 289px;padding: 0in 7px 0in 7px;background-color: #ededed;border-top: none;border-right: none;border-left: none;"><span style="font-size: 11pt;"><span style="line-height: normal;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;"><span style="color: black;">AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</span></span></span></span></span></td></tr></tbody></table> <br><br><span style="font-size: 11pt;"><span style="line-height: 107%;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;">Upon learning of the vulnerability, we immediately mobilized resources to fix the problem and have a <b>patch available now</b><b>.</b> </span><br><br><b><span style="font-family: "Arial",sans-serif;">It is critical that you immediately take action to ensure you are fully protected.</span></b><br><br><span style="font-family: "Arial",sans-serif;">Read this </span><a href="https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078&quot; style="color: blue;text-decoration: underline;" target="_blank"><span style="background: yellow;"><span style="font-family: "Arial",sans-serif;">Knowledge Base article </span></span></a><span style="font-family: "Arial",sans-serif;">for detailed information on how to access and apply the remediations. If you have questions or require further support, please log a case and/or request a call in the </span><a href="https://success.ivanti.com/community_home_page&quot; style="color: blue;text-decoration: underline;" target="_blank"><span style="font-family: "Arial",sans-serif;"><span style="color: #4e0389;">Success Portal</span></span></a><span style="font-family: "Arial",sans-serif;">.</span></span></span></span><br>  <div> <div> <div class="msocomtxt" id="_com_1"> </div> </div> </div>