U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

Jan 19, 2024NewsroomCyber Theat / Zero-Day

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core to its Known Exploited Vulnerabilities (KEV) catalog, stating it’s being actively exploited in the wild.

The vulnerability in question is CVE-2023-35082 (CVSS score: 9.8), an authentication bypass that’s a patch bypass for another flaw in the same solution tracked as CVE-2023-35078 (CVSS score: 10.0), which was actively exploited in attacks targeted Norwegian government entities as a zero-day in April 2023.

“If exploited, this vulnerability enables an unauthorized, remote (internet-facing) actor to potentially access users’ personally identifiable information and make limited changes to the server,” Ivanti noted in August 2023.

All versions of Ivanti Endpoint Manager Mobile (EPMM) 11.10, 11.9 and 11.8, and MobileIron Core 11.7 and below are impacted by the vulnerability.

Cybersecurity firm Rapid7, which discovered and reported the flaw, said it can be chained with CVE-2023-35081 to permit an attacker to write malicious web shell files to the appliance.

There are currently no details on how the vulnerability is being weaponized in real-world attacks. Federal agencies are recommended to apply vendor-provided fixes by February 8, 2024.

The disclosure comes as two other zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices (CVE-2023-46805 and CVE-2024-21887) have also come under mass exploitation to drop web shells and passive backdoors, with the company expected to release updates next week.

“We have observed the threat actor target the configuration and running cache of the system, which contains secrets important to the operation of the VPN,” Ivanti said in an advisory.

“While we haven’t observed this in every instance, out of an abundance of caution, Ivanti is recommending you rotate these secrets after rebuild.”

Volexity, this week, revealed that it has been able to find evidence of compromise of over 2,100 devices worldwide. While initial exploitation was linked to a suspected Chinese threat actor named UTA0178, additional threat actors have since joined the exploitation bandwagon.

The intrusions have targeted government, military, telecoms, defense contractors, technology, banking, consulting, aerospace, aviation, and engineering organizations in the U.S., Germany, the U.K., France, Spain, China, India, Australia, Russia, and Brazil.

The cybersecurity firm further noted that UTA0178, the suspected Chinese threat actor behind the initial attack wave in December 2023, made modifications to the in-built Integrity Checker Tool in an attempt to evade detection.

“Analysis of this file uncovered evidence that it had been modified so the system’s built-in Integrity Checker Tool would always indicate no findings, even if new or mismatched files were actually detected,” security researchers Matthew Meltzer, Sean Koessel, and Steven Adair said.

It’s recommended that organizations apply the mitigation provided by Ivanti after importing any backup configurations in order to prevent potential re-compromise of a device.

Further reverse engineering of the twin flaws by Assetnote has uncovered an additional endpoint (“/api/v1/totp/user-backup-code”) by which the authentication bypass flaw (CVE-2023-46805) could be abused on older versions of ICS and obtain a reverse shell.

Security researchers Shubham Shah and Dylan Pindur described it as “another example of a secure VPN device exposing itself to wide scale exploitation as the result of relatively simple security mistakes.”

(The story was updated after publication to include additional findings published by Volexity.)

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

You May Also Like

One thought on “U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

  1. Earn over $2000 weekly with AI Crypto Traders! Receive a $50 USDT bonus!
    ******
    [url=https://ai-crypto-trader.online?flow=1]ai-crypto-trader.online[/url]

    Join now for a 30-day free trial and kickstart your journey to financial success with us!
    Interested in cryptocurrency earnings? Welcome to the world of AI Crypto Traders – your reliable partner in achieving financial success. Our intelligent algorithms, capable of analyzing vast volumes of data and predicting market trends, will enable you to earn at least $2000 weekly and beyond.
    Join us now, and you can take advantage of a unique opportunity with a free trial period for 30 days. AI Crypto Traders is not just an easy way to earn but a guarantee of results. Start maximizing your cryptocurrency earnings today!

    Earn over $2000 weekly with AI Crypto Traders! Receive a $50 USDT bonus!

Leave a Reply

Your email address will not be published. Required fields are marked *


Unique Visitors
» 28,406 Today
» 30,519 Yesterday
» 117,270 This Week
» 58,925 This Month
» 3,699,070 This Year
» 19,934,165 Total (since 2019-12-11)
» Record: 205,757 (2023-08-13)
Counter by DarkWeb.Solutions