CVE-2023-35078 (GCVE-0-2023-35078)
Vulnerability from cvelistv5 – Published: 2023-07-25 06:08 – Updated: 2025-10-21 23:05
VLAI?
Summary
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
Severity ?
10 (Critical)
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Ivanti | Endpoint Manager Mobile |
Unaffected:
11.10 , ≤ 11.10
(semver)
Unaffected: 11.9 , ≤ 11.9 (semver) Unaffected: 11.8 , ≤ 11.8 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35078",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2023-12-09T05:05:16.354948Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-07-25",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:42.374Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-07-25T00:00:00+00:00",
"value": "CVE-2023-35078 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:23:57.598Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability"
},
{
"tags": [
"x_transferred"
],
"url": "https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Endpoint Manager Mobile",
"vendor": "Ivanti",
"versions": [
{
"lessThanOrEqual": "11.10",
"status": "unaffected",
"version": "11.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.9",
"status": "unaffected",
"version": "11.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8",
"status": "unaffected",
"version": "11.8",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2023-11-28T19:30:31.171Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability"
},
{
"url": "https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078"
},
{
"url": "https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"
},
{
"url": "https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2023-35078",
"datePublished": "2023-07-25T06:08:38.441Z",
"dateReserved": "2023-06-13T01:00:11.783Z",
"dateUpdated": "2025-10-21T23:05:42.374Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-35078",
"cwes": "[\"CWE-287\"]",
"dateAdded": "2023-07-25",
"dueDate": "2023-08-15",
"knownRansomwareCampaignUse": "Known",
"notes": "https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35078",
"product": "Endpoint Manager Mobile (EPMM)",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Ivanti Endpoint Manager Mobile (EPMM, previously branded MobileIron Core) contains an authentication bypass vulnerability that allows unauthenticated access to specific API paths. An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker can also make other configuration changes including installing software and modifying security profiles on registered devices.",
"vendorProject": "Ivanti",
"vulnerabilityName": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability"
},
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:23:57.598Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-35078\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-09T05:05:16.354948Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-07-25\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-07-25T00:00:00+00:00\", \"value\": \"CVE-2023-35078 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287 Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-24T20:45:52.608Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 10, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Ivanti\", \"product\": \"Endpoint Manager Mobile\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"11.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.10\"}, {\"status\": \"unaffected\", \"version\": \"11.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.9\"}, {\"status\": \"unaffected\", \"version\": \"11.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\"}, {\"url\": \"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\"}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\"}, {\"url\": \"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2023-11-28T19:30:31.171Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-35078\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:05:42.374Z\", \"dateReserved\": \"2023-06-13T01:00:11.783Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2023-07-25T06:08:38.441Z\", \"assignerShortName\": \"hackerone\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…