ivanti mobileiron-sentry CVE-2023-38035 is a vulnerability in Ivanti Mobileiron Sentry
Published on August 21, 2023

A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

Vendor Advisory NVD

Known Exploited Vulnerability

This Ivanti Sentry Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

The following remediation steps are recommended / required by September 12, 2023: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2023-38035 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is an AuthZ Vulnerability?

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

CVE-2023-38035 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2023-38035

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-38035 are published in these products:

 

What versions of Mobileiron Sentry are vulnerable to CVE-2023-38035?