First published: Mon Jul 31 2023(Updated: )
Ivanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Endpoint Manager Mobile | >=11.8.0<11.8.1.2 | |
Ivanti Endpoint Manager Mobile | >=11.9.0<11.9.1.2 | |
Ivanti Endpoint Manager Mobile | >=11.10.0<11.10.0.3 | |
Ivanti Endpoint Manager Mobile (EPMM) | ||
Ivanti Endpoint Manager Mobile | =11.10 | |
Ivanti Endpoint Manager Mobile | =11.9 | |
Ivanti Endpoint Manager Mobile | =11.8 | |
MobileIron Core | =11.7 and below |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The CVE ID of this vulnerability is CVE-2023-35081.
The severity of CVE-2023-35081 is high with a CVSS score of 7.2.
The affected software for CVE-2023-35081 is Ivanti Endpoint Manager Mobile (EPMM) versions 11.8.0 to 11.10.0.3.
CVE-2023-35081 is a path traversal vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows an authenticated administrator to perform malicious file writes to the EPMM server.
Yes, you can find more information about CVE-2023-35081 at the following link: [Ivanti Forum](https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US)