Article Details
Scrape Timestamp (UTC): 2024-01-18 20:55:32.163
Original Article Text
Click to Toggle View
CISA: Critical Ivanti auth bypass bug now actively exploited. CISA warns that a critical authentication bypass vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) and MobileIron Core device management software (patched in August 2023) is now under active exploitation. Tracked as CVE-2023-35082, the flaw is a remote unauthenticated API access vulnerability affecting all versions of EPMM 11.10, 11.9, and 11.8 and MobileIron Core 11.7 and below,. Successful exploitation provides attackers access to personally identifiable information (PII) of mobile device users and can let them backdoor compromised servers when chaining the bug with other flaws. "Ivanti has an RPM script available now. We recommend customers first upgrade to a supported version and then apply the RPM script," the company said in August. "More detailed information can be found in this Knowledge Base articleon the Ivanti Community portal." Cybersecurity company Rapid7, which discovered and reported the vulnerability, provides indicators of compromise(IOCs) to help admins detect signs of a CVE-2023-35082 attack. According to Shodan, 6,300 Ivanti EPMM user portals are currently exposed online, while the Shadowserver threat monitoring platform tracks 3,420 Internet-exposed EPMM appliances. Shodan's data also reveals that the more than 150 instances linked to government agencies worldwide can be directly accessed via the Internet. While it has yet to provide further details on CVE-2023-35082 active exploitation, CISA added the vulnerability to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation and says there's no evidence of abuse in ransomware attacks. The cybersecurity agency also ordered U.S. federal agencies to patch it by February 2, as required by a binding operational directive (BOD 22-01) issued three years ago. Ivanti has yet to update its August advisories or issue another notification warning that attackers are using this security vulnerability in the wild. Two other Ivanti Connect Secure (ICS) zero-days, an auth bypass (CVE-2023-46805) and a command injection (CVE-2024-21887) are now also under mass exploitation by multiple threat groups, starting January 11. Victims compromised so far range from small businesses to multiple Fortune 500 companies from various industry sectors, with the attackers having already backdoored over 1,700 ICS VPN appliances using a GIFTEDVISITOR webshell variant. Multiple other Ivanti zero-days (i.e., CVE-2021-22893, CVE-2023-35078, CVE-2023-35081, CVE-2023-38035) have been exploited in recent years to breach dozens of government, defense, and financial organizations across the United States and Europe, several Norwegian government organizations, as well as in targeted attacks.
Daily Brief Summary
CISA alerts that a critical authentication bypass bug in Ivanti's device management software is actively being exploited.
The flaw, tracked as CVE-2023-35082, allows unauthorized API access and affects several versions of Ivanti's software.
Successful exploitation could lead to access to personal information and potential backdoor creation into compromised servers.
Organizations are urged to upgrade to a supported version and apply Ivanti's provided RPM script to mitigate risks.
Over 6,300 Ivanti EPMM user portals are exposed online, with some pertaining to government agencies.
CISA mandates federal agencies to patch the vulnerability by February 2, in line with a 3-year-old operational directive.
Multiple Ivanti Connect Secure zero-days are also under mass exploitation, affecting businesses including Fortune 500 companies.
Several Ivanti zero-days have been previously exploited in attacks targeting government, defense, and financial sectors.