Exploitation of the recently disclosed Ivanti Endpoint Manager Mobile (EPMM) vulnerability has started to pick up, just as the vendor announced the discovery of a new flaw.
The EPMM zero-day tracked as CVE-2023-35078, which allows an unauthenticated attacker to obtain sensitive information and make changes to the targeted system, was exploited in attacks aimed at the Norwegian government since at least April 2023.
While initially the flaw was only exploited in targeted attacks, threat intelligence firm GreyNoise started seeing exploitation attempts from dozens of unique IP addresses on July 31. The company has seen attacks coming from a total of 75 IPs.
The ShadowServer Foundation reports that there are still roughly 700 internet-exposed instances of the mobile management software that are vulnerable to attacks.
In the attacks exploiting CVE-2023-35078, threat actors also leveraged a different EPMM security hole, CVE-2023-35081, to upload webshells on the device and run commands.
This week, Ivanti informed customers about a third new vulnerability, CVE-2023-35082, which allows an unauthenticated, remote attacker to access users’ personally identifiable information and make limited changes to the server.
Rapid7, whose researchers discovered this critical flaw, reported that CVE-2023-35082 is actually a bypass of the fix for CVE-2023-35078.
“CVE-2023-35081 could be chained with CVE-2023-35082 to allow an attacker write malicious webshell files to the appliance, which may then be executed by the attacker,” the cybersecurity firm explained.
One noteworthy aspect is that CVE-2023-35082 can only be exploited against unsupported versions of MobileIron Core, version 11.2 and below. MobileIron Core is the previous name of EPMM.
“The vulnerability was incidentally resolved in MobileIron Core 11.3 as part of work on a product bug. It had not previously been identified as a vulnerability,” Ivanti said in its advisory.
The US Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) said this week that they are concerned about the potential for widespread exploitation of the vulnerabilities against government and private sector organizations.
Related: Citrix Zero-Day Exploited Against Critical Infrastructure Organization
Related: Adobe Releases New Patches for Exploited ColdFusion Vulnerabilities
Related: Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances