CVE-2023-35081: Vulnerability in Ivanti EPMM
CVE-2023-35081 is a high-severity path traversal vulnerability in Ivanti EPMM versions prior to 11. 10. 0. 3, 11. 9. 1. 2, and 11. 8. 1. 2.
AI Analysis
Technical Summary
CVE-2023-35081 is a path traversal vulnerability identified in Ivanti Endpoint Manager Mobile (EPMM) affecting versions prior to 11.10.0.3, 11.9.1.2, and 11.8.1.2. The flaw allows an authenticated administrator to write arbitrary files to the appliance filesystem by exploiting insufficient validation of file paths. This can lead to overwriting critical system files, implanting malicious scripts, or altering configuration files, thereby compromising the confidentiality, integrity, and availability of the appliance. The vulnerability requires administrator-level privileges but does not require user interaction, making it easier to exploit once credentials are obtained. Ivanti EPMM is widely used for mobile device management and endpoint security in enterprise environments, making this vulnerability particularly impactful. Although no public exploits are reported yet, the potential for lateral movement, persistent backdoors, or disruption of managed devices is significant. The CVSS v3.0 score of 7.2 reflects the network attack vector, low complexity, high privileges required, and high impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed in August 2023, with patches available in the specified fixed versions.
Potential Impact
For European organizations, this vulnerability poses a considerable risk to enterprise mobility and endpoint management infrastructures. Successful exploitation could allow attackers to implant malicious files, disrupt device management, or gain persistent access to critical systems. This could lead to data breaches, unauthorized access to sensitive corporate information, and disruption of business operations. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Ivanti EPMM for device management are particularly vulnerable. The ability to write arbitrary files could also facilitate supply chain attacks or lateral movement within networks. Given the high privileges required, the threat is primarily from insider threats or attackers who have already compromised administrator credentials. However, the impact on confidentiality, integrity, and availability is high, making timely remediation essential to prevent potential damage.
Mitigation Recommendations
1. Immediately upgrade Ivanti EPMM to the fixed versions 11.10.0.3, 11.9.1.2, or 11.8.1.2 as applicable. 2. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication. 3. Monitor file system changes on the appliance for unauthorized or suspicious file writes, especially in critical directories. 4. Implement network segmentation to limit access to the EPMM appliance and reduce the attack surface. 5. Regularly audit administrator activities and review logs for anomalous behavior. 6. Employ endpoint detection and response (EDR) solutions to detect lateral movement or persistence attempts stemming from compromised EPMM appliances. 7. Educate administrators on the risks of credential compromise and enforce credential hygiene policies. 8. Consider deploying application whitelisting or integrity monitoring on the appliance to detect unauthorized file modifications. 9. Maintain an incident response plan tailored to mobile device management infrastructure compromises.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2023-35081: Vulnerability in Ivanti EPMM
Description
CVE-2023-35081 is a high-severity path traversal vulnerability in Ivanti EPMM versions prior to 11. 10. 0. 3, 11. 9. 1. 2, and 11. 8. 1. 2.
AI-Powered Analysis
Technical Analysis
CVE-2023-35081 is a path traversal vulnerability identified in Ivanti Endpoint Manager Mobile (EPMM) affecting versions prior to 11.10.0.3, 11.9.1.2, and 11.8.1.2. The flaw allows an authenticated administrator to write arbitrary files to the appliance filesystem by exploiting insufficient validation of file paths. This can lead to overwriting critical system files, implanting malicious scripts, or altering configuration files, thereby compromising the confidentiality, integrity, and availability of the appliance. The vulnerability requires administrator-level privileges but does not require user interaction, making it easier to exploit once credentials are obtained. Ivanti EPMM is widely used for mobile device management and endpoint security in enterprise environments, making this vulnerability particularly impactful. Although no public exploits are reported yet, the potential for lateral movement, persistent backdoors, or disruption of managed devices is significant. The CVSS v3.0 score of 7.2 reflects the network attack vector, low complexity, high privileges required, and high impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed in August 2023, with patches available in the specified fixed versions.
Potential Impact
For European organizations, this vulnerability poses a considerable risk to enterprise mobility and endpoint management infrastructures. Successful exploitation could allow attackers to implant malicious files, disrupt device management, or gain persistent access to critical systems. This could lead to data breaches, unauthorized access to sensitive corporate information, and disruption of business operations. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Ivanti EPMM for device management are particularly vulnerable. The ability to write arbitrary files could also facilitate supply chain attacks or lateral movement within networks. Given the high privileges required, the threat is primarily from insider threats or attackers who have already compromised administrator credentials. However, the impact on confidentiality, integrity, and availability is high, making timely remediation essential to prevent potential damage.
Mitigation Recommendations
1. Immediately upgrade Ivanti EPMM to the fixed versions 11.10.0.3, 11.9.1.2, or 11.8.1.2 as applicable. 2. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication. 3. Monitor file system changes on the appliance for unauthorized or suspicious file writes, especially in critical directories. 4. Implement network segmentation to limit access to the EPMM appliance and reduce the attack surface. 5. Regularly audit administrator activities and review logs for anomalous behavior. 6. Employ endpoint detection and response (EDR) solutions to detect lateral movement or persistence attempts stemming from compromised EPMM appliances. 7. Educate administrators on the risks of credential compromise and enforce credential hygiene policies. 8. Consider deploying application whitelisting or integrity monitoring on the appliance to detect unauthorized file modifications. 9. Maintain an incident response plan tailored to mobile device management infrastructure compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2023-06-13T01:00:11.784Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68f7d9aa247d717aace21f05
Added to database: 10/21/2025, 7:06:18 PM
Last enriched: 10/28/2025, 11:50:43 PM
Last updated: 10/30/2025, 3:32:32 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.