Ivanti, an IT software firm, has issued a critical warning urging users to update their Endpoint Manager Mobile (EPMM) software to the latest version immediately. The reason behind this urgent call is an actively exploited zero-day vulnerability, known as CVE-2023-35078, affecting versions 11.4 releases 11.10, 11.9, and 11.8, as well as older releases. This vulnerability has been categorized with the highest severity rating of 10 on the CVSS scale.
The security flaw in Ivanti EPMM has been identified as a remote unauthenticated API access vulnerability. Unauthorized users can bypass authentication measures, gaining access to restricted functionalities and resources without proper authorization.
If exploited successfully, this vulnerability could allow a remote, internet-facing attacker to potentially access users’ personally identifiable information and make unauthorized changes to the EPMM server. The implications of this exploit are far-reaching, with adversaries able to obtain sensitive data such as names, phone numbers, and other mobile device details of vulnerable systems.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also acknowledged the risk associated with the vulnerability. It warns that threat actors with access to the API paths can exploit this weakness to extract personally identifiable information and manipulate configuration settings, potentially creating an administrative account for further unauthorized changes.
While Ivanti has confirmed active exploitation of the bug against a limited number of customers, specific details regarding the nature of the attacks and the identities of the threat actors remain undisclosed.
The Norwegian National Security Authority (NSM) has provided further confirmation of the severity of the zero-day vulnerability. According to NSM reports, unknown threat actors have already exploited the security flaw to target the Government Security and Service Organization (DSS).
To mitigate the risk, security researcher Kevin Beaumont has identified and shared patches for the affected versions, namely 11.8.1.1, 11.9.1.1, and 11.10.0.2. Users are strongly urged to apply these updates promptly to safeguard their systems from potential attacks exploiting this dangerous vulnerability.