Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35081: Vulnerability in Ivanti EPMM

0
High
VulnerabilityCVE-2023-35081cvecve-2023-35081
Published: Thu Aug 03 2023 (08/03/2023, 17:00:10 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: EPMM

Description

CVE-2023-35081 is a high-severity path traversal vulnerability in Ivanti EPMM versions prior to 11. 10. 0. 3, 11. 9. 1. 2, and 11. 8. 1. 2.

AI-Powered Analysis

AILast updated: 10/28/2025, 23:50:43 UTC

Technical Analysis

CVE-2023-35081 is a path traversal vulnerability identified in Ivanti Endpoint Manager Mobile (EPMM) affecting versions prior to 11.10.0.3, 11.9.1.2, and 11.8.1.2. The flaw allows an authenticated administrator to write arbitrary files to the appliance filesystem by exploiting insufficient validation of file paths. This can lead to overwriting critical system files, implanting malicious scripts, or altering configuration files, thereby compromising the confidentiality, integrity, and availability of the appliance. The vulnerability requires administrator-level privileges but does not require user interaction, making it easier to exploit once credentials are obtained. Ivanti EPMM is widely used for mobile device management and endpoint security in enterprise environments, making this vulnerability particularly impactful. Although no public exploits are reported yet, the potential for lateral movement, persistent backdoors, or disruption of managed devices is significant. The CVSS v3.0 score of 7.2 reflects the network attack vector, low complexity, high privileges required, and high impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed in August 2023, with patches available in the specified fixed versions.

Potential Impact

For European organizations, this vulnerability poses a considerable risk to enterprise mobility and endpoint management infrastructures. Successful exploitation could allow attackers to implant malicious files, disrupt device management, or gain persistent access to critical systems. This could lead to data breaches, unauthorized access to sensitive corporate information, and disruption of business operations. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Ivanti EPMM for device management are particularly vulnerable. The ability to write arbitrary files could also facilitate supply chain attacks or lateral movement within networks. Given the high privileges required, the threat is primarily from insider threats or attackers who have already compromised administrator credentials. However, the impact on confidentiality, integrity, and availability is high, making timely remediation essential to prevent potential damage.

Mitigation Recommendations

1. Immediately upgrade Ivanti EPMM to the fixed versions 11.10.0.3, 11.9.1.2, or 11.8.1.2 as applicable. 2. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication. 3. Monitor file system changes on the appliance for unauthorized or suspicious file writes, especially in critical directories. 4. Implement network segmentation to limit access to the EPMM appliance and reduce the attack surface. 5. Regularly audit administrator activities and review logs for anomalous behavior. 6. Employ endpoint detection and response (EDR) solutions to detect lateral movement or persistence attempts stemming from compromised EPMM appliances. 7. Educate administrators on the risks of credential compromise and enforce credential hygiene policies. 8. Consider deploying application whitelisting or integrity monitoring on the appliance to detect unauthorized file modifications. 9. Maintain an incident response plan tailored to mobile device management infrastructure compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2023-06-13T01:00:11.784Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68f7d9aa247d717aace21f05

Added to database: 10/21/2025, 7:06:18 PM

Last enriched: 10/28/2025, 11:50:43 PM

Last updated: 10/30/2025, 3:32:32 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats