CVE-2023-38035

critical

Description

A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

From the Tenable Blog

CVE-2023-38035: Ivanti Sentry API Authentication Bypass Zero-Day Exploited in the Wild
CVE-2023-38035: Ivanti Sentry API Authentication Bypass Zero-Day Exploited in the Wild

Published: 2023-08-22

For the third time in a month, Ivanti discloses a zero-day vulnerability in one of its products that has been exploited in the wild

References

https://veriti.ai/blog/vulnerable-villain-when-hackers-get-hacked/

https://www.tenable.com/blog/cve-2023-38035-ivanti-sentry-api-authentication-bypass-zero-day-exploited-in-the-wild

https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface

http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html

Details

Source: Mitre, NVD

Published: 2023-08-21

Updated: 2024-12-20

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical