
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2023-35082 is an authentication bypass vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) 11.10 and older versions, including MobileIron Core. The vulnerability was discovered by Stephen Fewer from Rapid7 while investigating CVE-2023-35078, and was initially disclosed on August 2, 2023. This vulnerability allows unauthorized users to access restricted functionality or resources of the application without proper authentication (Rapid7 Blog, Ivanti Blog).
The vulnerability arises from the permissive nature of certain entries in the mifs web application's security filter chain. While the original vulnerability (CVE-2023-35078) was exploited through the /aad/ segment in the URL path, CVE-2023-35082 can be exploited using the /asfV3/ path segment. The vulnerability has received a CVSS v3.1 base score of 9.8 (Critical) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (Rapid7 Blog).
If exploited, this vulnerability enables an unauthorized, remote actor to access API endpoints and perform various operations, including accessing users' personally identifiable information (PII) and making limited changes to the server. Additionally, it can be chained with other vulnerabilities like CVE-2023-35081 to allow attackers to write malicious webshell files to the appliance (Rapid7 Blog, Ivanti Blog).
Ivanti has released an RPM Fix for versions 11.10 to 11.3. Customers running older versions should first upgrade to 11.10 and then apply the RPM fix. The fix should be applied as soon as possible without waiting for regular patch cycles. Customers can access detailed information about the fix through the Ivanti Community portal (Rapid7 Blog).
The vulnerability has gained significant attention from the cybersecurity community, leading to CISA adding it to their Known Exploited Vulnerabilities Catalog. Federal Civilian Executive Branch (FCEB) agencies are required to remediate the vulnerability under Binding Operational Directive (BOD) 22-01 (CISA Alert).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”