Skip to main content
CVE-2023-35078 Critical Patch Available

CVE-2023-35078: Ivanti EPMM — Unauthenticated API Access

CVE Details

CVE ID CVE-2023-35078
CVSS Score 10
Severity Critical
Vendor Ivanti
Product Endpoint Manager Mobile (EPMM)
Patch Status Available
Published July 25, 2023
EPSS Score 94.4%
CISA Patch Deadline ⚠ August 15, 2023 Federal deadline passed

Background

Ivanti Endpoint Manager Mobile, formerly known as MobileIron Core, is a mobile device management (MDM) platform used by organisations to manage employee smartphones, tablets, and laptops. It’s widely deployed in government, healthcare, and financial services — sectors that need robust device management and are also subject to strict data protection requirements.

CVE-2023-35078 is a perfect 10.0 CVSS score — unauthenticated access to any API endpoint, no credentials required, no special conditions. It was discovered being exploited in the wild as a zero-day, with Norwegian government agencies among the confirmed victims. Ivanti patched it in July 2023 under pressure after attribution of active exploitation.

Technical Mechanism

EPMM exposes a REST API for device management, configuration, and data access. The authentication mechanism has a bypass condition where specific API paths can be accessed without any authentication by manipulating the request path.

The bypass exploits the way the application’s servlet filter processes URL patterns. Certain path patterns intended to be public (like health check endpoints) are defined with wildcard patterns that are overly broad. By appending these public path suffixes or manipulating request paths, an attacker can access any API endpoint without authentication.

For example, a request to:

/mifs/aad/api/v2/authorized/..;/api/v2/devicestatistics

The ..; sequence in many Java application frameworks (including those using Apache Tomcat) causes the path to be evaluated differently by the URL filter versus the servlet router. The filter sees a public path; the router sees the actual API endpoint.

Once unauthenticated API access is achieved, attackers can:

  • Query the API for usernames, email addresses, device information, and phone numbers
  • In combination with CVE-2023-35081 (a separate file write bug), drop a webshell and achieve RCE

Real-World Exploitation Evidence

CISA and NCSC Norway issued a joint advisory noting that CVE-2023-35078 was exploited as a zero-day against Norwegian government agencies — specifically the Norwegian Security and Service Organisation, which serves 12 government ministries. This was confirmed before Ivanti had a patch.

Additional exploitation indicators:

  • APT activity — security researchers attributed the zero-day exploitation to a sophisticated threat actor with characteristics consistent with a state-sponsored group
  • Reconnaissance campaigns — broad scanning for EPMM/MobileIron instances observed in threat intelligence feeds
  • Chained with CVE-2023-35081 — the file write vulnerability was used in combination to achieve full RCE beyond just data access

The targeting of government MDM infrastructure is significant — compromising MDM gives visibility into all managed devices, including government mobile devices that may contain sensitive information.

Impact Assessment

  • Mass data exfiltration — user data, device inventory, email addresses, and phone numbers accessible without authentication
  • Device manipulation — MDM APIs can push configuration profiles, install applications, and remotely wipe devices
  • Remote code execution — when chained with CVE-2023-35081, full RCE on the EPMM server
  • Government operations disruption — in the Norwegian case, 12 ministries’ IT management capabilities were exposed
  • Compliance violation — access to MDM data almost certainly constitutes a data breach under GDPR and similar frameworks

Affected Versions

ProductAffected VersionsFixed Version
Ivanti EPMM (MobileIron Core)11.10.x before 11.10.0.211.10.0.2
Ivanti EPMM (MobileIron Core)11.9.x before 11.9.1.211.9.1.2
Ivanti EPMM (MobileIron Core)11.8.x before 11.8.1.211.8.1.2
Ivanti EPMMOlder than 11.8Update required; check Ivanti advisory

Remediation Steps

  1. Apply Ivanti patches for your version immediately — this is a CVSS 10.0, treat it as such
  2. Check if your EPMM instance is internet-accessible and restrict access to trusted IP ranges if it is
  3. Review API access logs for unauthenticated requests to management API endpoints:
    • Logs location: /mi/jss/logs/ on the EPMM appliance
  4. Check for indicators of CVE-2023-35081 exploitation (file writes to web directories)
  5. Audit for any newly created administrator accounts in EPMM
  6. Review managed device policies for unauthorised changes
  7. If compromise is suspected, notify affected users as MDM typically manages personal data

Detection Guidance

EPMM logs — look for API access log entries where:

  • Requests to /mifs/aad/api/ or /api/v2/ endpoints with no authentication header
  • Path traversal sequences (..;) in request URLs
  • Unusual user agents (automated exploit tools often use generic user agents)

Network monitoring — monitor for bulk data export patterns from the EPMM server, particularly large API responses to external IPs.

Suricata signature:

alert http any any -> $HTTP_SERVERS any (msg:"Ivanti EPMM CVE-2023-35078 Auth Bypass Attempt"; flow:established,to_server; http.uri; content:"/mifs/"; content:"..;"; distance:0; classtype:web-application-attack; sid:2034010; rev:1;)

IOCs:

  • Requests containing ..; in paths to EPMM API endpoints
  • Unexpected admin account creation in EPMM console
  • Large API data exports to external IPs

Timeline

DateEvent
July 2023CVE-2023-35078 exploited as zero-day against Norwegian government
23 July 2023Ivanti releases patch
24 July 2023CISA and Norwegian NCSC issue joint advisory
July 2023CISA adds to Known Exploited Vulnerabilities catalogue
August 2023CVE-2023-35081 (chained file write) exploitation details published
2023Continued targeting of MDM/EMM solutions by state-sponsored actors