Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35078: Vulnerability in Ivanti Endpoint Manager Mobile

0
Critical
VulnerabilityCVE-2023-35078cvecve-2023-35078
Published: Tue Jul 25 2023 (07/25/2023, 06:08:38 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager Mobile

Description

CVE-2023-35078 is a critical authentication bypass vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows attackers to access restricted application functionality and resources without any authentication. The vulnerability has a CVSS score of 10, indicating maximum severity, with complete compromise of confidentiality, integrity, and availability possible. No user interaction or privileges are required to exploit this flaw, and it affects all versions of the product. While no public exploits are currently known, the vulnerability poses a significant risk to organizations using Ivanti EPMM for mobile device management. European organizations relying on this product for endpoint security could face unauthorized access, data breaches, and operational disruption. Immediate patching or mitigation is critical, though no patches are currently listed. Organizations should implement network-level restrictions, monitor for anomalous access, and consider compensating controls until a fix is available. Countries with high adoption of Ivanti EPMM and critical infrastructure reliance on mobile device management, such as Germany, the UK, France, and the Netherlands, are most at risk.

AI-Powered Analysis

AILast updated: 10/28/2025, 23:50:34 UTC

Technical Analysis

CVE-2023-35078 is an authentication bypass vulnerability identified in Ivanti Endpoint Manager Mobile (EPMM), a widely used mobile device management (MDM) solution. The vulnerability allows an unauthenticated attacker to bypass authentication mechanisms and gain unauthorized access to restricted functionalities and resources within the application. This flaw is categorized under CWE-287 (Improper Authentication), indicating that the system fails to properly verify user credentials before granting access. The CVSS v3.0 base score of 10.0 reflects the critical nature of this vulnerability, with attack vector being network-based (AV:N), requiring no privileges (PR:N), no user interaction (UI:N), and impacting confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. Exploitation could lead to full compromise of the MDM environment, allowing attackers to manipulate device configurations, access sensitive data, deploy malicious payloads, or disrupt mobile device operations. Although no known exploits have been reported in the wild, the severity and ease of exploitation make this a high-priority issue. The lack of specified affected versions and absence of published patches at the time of disclosure increases the urgency for organizations to implement interim mitigations and monitor for suspicious activity. Ivanti EPMM is commonly deployed in enterprise environments to manage and secure mobile endpoints, making this vulnerability particularly impactful for organizations relying on it for endpoint security and compliance.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the security and operational integrity of mobile device management infrastructures. Unauthorized access to Ivanti EPMM could allow attackers to manipulate device policies, access confidential corporate data, and potentially deploy malware or ransomware across managed devices. This could lead to widespread data breaches, regulatory non-compliance (especially under GDPR), and operational disruptions. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on mobile device management for secure operations are at heightened risk. The ability to bypass authentication without any user interaction or privileges means that attackers can exploit this vulnerability remotely and stealthily, increasing the likelihood of targeted attacks or opportunistic exploitation. The potential for full compromise of confidentiality, integrity, and availability underscores the critical impact on business continuity and data protection obligations within European jurisdictions.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, European organizations should immediately implement compensating controls to mitigate risk. These include restricting network access to the Ivanti EPMM management interface to trusted IP addresses and VPN-only access to reduce exposure. Implement strict firewall rules and segmentation to isolate the management server from general network traffic. Enable and enhance logging and monitoring on the EPMM server to detect anomalous access patterns or unauthorized attempts. Conduct thorough audits of user accounts and permissions within the EPMM environment to minimize potential attack surfaces. Where possible, temporarily disable non-essential functionalities or services within the EPMM platform that could be exploited. Organizations should also engage with Ivanti support to obtain timelines for patches and apply updates promptly once available. Additionally, educating security teams about this vulnerability and preparing incident response plans specific to EPMM compromise scenarios will improve readiness. Finally, consider deploying endpoint detection and response (EDR) solutions on managed devices to detect suspicious activities stemming from potential EPMM exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2023-06-13T01:00:11.783Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f7d9aa247d717aace21efe

Added to database: 10/21/2025, 7:06:18 PM

Last enriched: 10/28/2025, 11:50:34 PM

Last updated: 10/30/2025, 3:34:06 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats