Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Zero-Day Alert: Update EPMM Now!

July 25, 2023
Reading Time: 2 mins read
in Alerts
Zero-Day Alert: Update EPMM Now!

 

Ivanti, an IT software firm, has issued a critical warning urging users to update their Endpoint Manager Mobile (EPMM) software to the latest version immediately. The reason behind this urgent call is an actively exploited zero-day vulnerability, known as CVE-2023-35078, affecting versions 11.4 releases 11.10, 11.9, and 11.8, as well as older releases. This vulnerability has been categorized with the highest severity rating of 10 on the CVSS scale.

The security flaw in Ivanti EPMM has been identified as a remote unauthenticated API access vulnerability. Unauthorized users can bypass authentication measures, gaining access to restricted functionalities and resources without proper authorization.

If exploited successfully, this vulnerability could allow a remote, internet-facing attacker to potentially access users’ personally identifiable information and make unauthorized changes to the EPMM server. The implications of this exploit are far-reaching, with adversaries able to obtain sensitive data such as names, phone numbers, and other mobile device details of vulnerable systems.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also acknowledged the risk associated with the vulnerability. It warns that threat actors with access to the API paths can exploit this weakness to extract personally identifiable information and manipulate configuration settings, potentially creating an administrative account for further unauthorized changes.

While Ivanti has confirmed active exploitation of the bug against a limited number of customers, specific details regarding the nature of the attacks and the identities of the threat actors remain undisclosed.

The Norwegian National Security Authority (NSM) has provided further confirmation of the severity of the zero-day vulnerability. According to NSM reports, unknown threat actors have already exploited the security flaw to target the Government Security and Service Organization (DSS).

To mitigate the risk, security researcher Kevin Beaumont has identified and shared patches for the affected versions, namely 11.8.1.1, 11.9.1.1, and 11.10.0.2. Users are strongly urged to apply these updates promptly to safeguard their systems from potential attacks exploiting this dangerous vulnerability.

Reference:
  • CVE-2023-35078 – Remote Unauthenticated API Access Vulnerability
Tags: Cyber AlertCyber Alerts 2023CyberattackCybersecurityEndpoint SecurityEPMMIvantiJuly 2023Mobile Securityzero-day vulnerability
ADVERTISEMENT

Related Posts

Glassworm Malware Strikes Again In VS Code

Shadypanda Extensions Hit Millions Users

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Smarttube Breach Pushes Malicious Update

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Glassworm Malware Strikes Again In VS Code

December 2, 2025
Albiriox Malware Hits Hundreds Of Apps

Google Meet Page Used To Deliver Malware

December 1, 2025
Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025

Latest Alerts

Shadypanda Extensions Hit Millions Users

Smarttube Breach Pushes Malicious Update

Glassworm Malware Strikes Again In VS Code

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Subscribe to our newsletter

    Latest Incidents

    French Soccer Federation Suffers Cyberattack

    120,000 Cameras Hacked In South Korea

    Hackers Claim Mercedes Benz USA Breach

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial