CVE-2023-35078 (GCVE-0-2023-35078)
Vulnerability from cvelistv5 – Published: 2023-07-25 06:08 – Updated: 2025-10-21 23:05
VLAI?
CISA
Summary
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
Severity ?
10 (Critical)
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Ivanti | Endpoint Manager Mobile |
Unaffected:
11.10 , ≤ 11.10
(semver)
Unaffected: 11.9 , ≤ 11.9 (semver) Unaffected: 11.8 , ≤ 11.8 (semver) |
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2023-07-25
Due date: 2023-08-15
Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Known
Notes: https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35078
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "endpoint_manager_mobile",
"vendor": "ivanti",
"versions": [
{
"lessThan": "11.10.0.2",
"status": "affected",
"version": "11.10.0.1",
"versionType": "semver"
},
{
"lessThan": "11.9.1.1",
"status": "affected",
"version": "11.9.1.0",
"versionType": "semver"
},
{
"lessThan": "11.8.1.1",
"status": "affected",
"version": "11.8.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8.1.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35078",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2023-12-09T05:05:16.354948Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-07-25",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:42.374Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-07-25T00:00:00+00:00",
"value": "CVE-2023-35078 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:23:57.598Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability"
},
{
"tags": [
"x_transferred"
],
"url": "https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Endpoint Manager Mobile",
"vendor": "Ivanti",
"versions": [
{
"lessThanOrEqual": "11.10",
"status": "unaffected",
"version": "11.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.9",
"status": "unaffected",
"version": "11.9",
"versionType": "semver"
},
{
"lessThanOrEqual": "11.8",
"status": "unaffected",
"version": "11.8",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2023-11-28T19:30:31.171Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability"
},
{
"url": "https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078"
},
{
"url": "https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078"
},
{
"url": "https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2023-35078",
"datePublished": "2023-07-25T06:08:38.441Z",
"dateReserved": "2023-06-13T01:00:11.783Z",
"dateUpdated": "2025-10-21T23:05:42.374Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-35078",
"cwes": "[\"CWE-287\"]",
"dateAdded": "2023-07-25",
"dueDate": "2023-08-15",
"knownRansomwareCampaignUse": "Known",
"notes": "https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35078",
"product": "Endpoint Manager Mobile (EPMM)",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Ivanti Endpoint Manager Mobile (EPMM, previously branded MobileIron Core) contains an authentication bypass vulnerability that allows unauthenticated access to specific API paths. An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker can also make other configuration changes including installing software and modifying security profiles on registered devices.",
"vendorProject": "Ivanti",
"vulnerabilityName": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2023-08-15",
"cisaExploitAdd": "2023-07-25",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"11.8.1.1\", \"matchCriteriaId\": \"7C48786C-399D-4B0C-8082-64112C4DA5C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.9.0\", \"versionEndExcluding\": \"11.9.1.1\", \"matchCriteriaId\": \"50C1A12C-5862-48B6-ADA3-4222516DA152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.10\", \"versionEndExcluding\": \"11.10.0.2\", \"matchCriteriaId\": \"76DAE9E0-15F0-40AB-8D03-E64423AD0E07\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de omisi\\u00f3n de autenticaci\\u00f3n en Ivanti EPMM permite a usuarios no autorizados acceder a funciones o recursos restringidos de la aplicaci\\u00f3n sin la autenticaci\\u00f3n adecuada.\"}]",
"id": "CVE-2023-35078",
"lastModified": "2024-12-20T17:50:19.417",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"support@hackerone.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 10.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 6.0}]}",
"published": "2023-07-25T07:15:10.897",
"references": "[{\"url\": \"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\", \"source\": \"support@hackerone.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\", \"source\": \"support@hackerone.com\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\", \"source\": \"support@hackerone.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\", \"source\": \"support@hackerone.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Vendor Advisory\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-35078\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2023-07-25T07:15:10.897\",\"lastModified\":\"2025-10-31T21:58:35.650\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Ivanti EPMM permite a usuarios no autorizados acceder a funciones o recursos restringidos de la aplicaci\u00f3n sin la autenticaci\u00f3n adecuada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0}]},\"cisaExploitAdd\":\"2023-07-25\",\"cisaActionDue\":\"2023-08-15\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.8.1.1\",\"matchCriteriaId\":\"7C48786C-399D-4B0C-8082-64112C4DA5C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.9.0\",\"versionEndExcluding\":\"11.9.1.1\",\"matchCriteriaId\":\"50C1A12C-5862-48B6-ADA3-4222516DA152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.10\",\"versionEndExcluding\":\"11.10.0.2\",\"matchCriteriaId\":\"76DAE9E0-15F0-40AB-8D03-E64423AD0E07\"}]}]}],\"references\":[{\"url\":\"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\",\"source\":\"support@hackerone.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\",\"source\":\"support@hackerone.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\",\"source\":\"support@hackerone.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\",\"source\":\"support@hackerone.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:23:57.598Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-35078\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-09T05:05:16.354948Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-07-25\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*\"], \"vendor\": \"ivanti\", \"product\": \"endpoint_manager_mobile\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.10.0.1\", \"lessThan\": \"11.10.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.9.1.0\", \"lessThan\": \"11.9.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.8.1.0\", \"lessThan\": \"11.8.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8.1.0\"}], \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-07-25T00:00:00+00:00\", \"value\": \"CVE-2023-35078 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-35078\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"CWE-287 Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-24T20:45:52.608Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 10, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Ivanti\", \"product\": \"Endpoint Manager Mobile\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"11.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.10\"}, {\"status\": \"unaffected\", \"version\": \"11.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.9\"}, {\"status\": \"unaffected\", \"version\": \"11.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.8\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability\"}, {\"url\": \"https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078\"}, {\"url\": \"https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078\"}, {\"url\": \"https://www.ivanti.com/blog/cve-2023-35078-new-ivanti-epmm-vulnerability\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2023-11-28T19:30:31.171Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-35078\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:05:42.374Z\", \"dateReserved\": \"2023-06-13T01:00:11.783Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2023-07-25T06:08:38.441Z\", \"assignerShortName\": \"hackerone\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…