Security

Patches

Ivanti Sentry exploited in the wild, patches emitted

Good thing you're not exposing admin port 8443 to the world, right? Uh, right?


A critical authentication bypass bug in MobileIron Sentry has been exploited in the wild, its maker Ivanti said in an advisory on Monday.

This vulnerability, tracked as CVE-2023-38035, is a 9.8-of-10 flaw in terms of CVSS severity, and strictly speaking lies within Ivanti Sentry, formerly known as MobileIron Sentry. This is a gateway that manages and encrypts traffic between an organization's mobile devices and back-end systems.

Exploitation of this vuln may result in an intruder gaining control of this sensitive network component. To do so, attackers must be able to reach administrative API port 8443 of a vulnerable Sentry deployment, which may not be public facing. According to Ivanti, a "limited" number of customers have been targeted via this flaw so far.

Miscreants can exploit this hole to bypass authentication on the administrative interface due to an insufficiently restrictive Apache HTTPd configuration. From there, they can access some sensitive admin APIs used to configure Sentry via port 8443. 

"Successful exploitation can be used to change configuration, run system commands, or write files onto the system," the security alert explained. "As of now, we are only aware of a limited number of customers impacted by CVE-2023-38035."

There is some good news. "While the issue has a high CVSS score, there is a low risk of exploitation for customers who do not expose port 8443 to the internet," Ivanti claimed. Ivanti Sentry versions 9.18 and earlier are affected, and the bug does not impact any other Ivanti products, we're told.

"Upon learning of the vulnerability, we immediately mobilized resources to fix the problem and have RPM scripts available now for supported versions. Each script is customized for a single version." The vendor also noted that  applying the wrong script may prevent the issue from being fixed or cause "system instability."

The company declined to answer The Register's specific questions about the security flaw, including how many customers were compromised.

Today's advisory is the software vendor's third such alert in less than a month.

In late July, miscreants exploited CVE-2023-35078, another remote authentication bypass flaw in Ivanti Endpoint Manager Mobile (EPMM), to compromise victims 12 Norwegian government agencies at least before the developer issued a fix.

According to the US government's CISA and the Norwegian National Cyber Security Centre, whoever exploited that critical vulnerability spent at least four months snooping around their victims' systems and stealing data before an intrusion was spotted.

The two nations also warned of "potential for widespread exploitation" of Ivanti's software in both government and enterprise networks.

Just days later, Ivanti patched a second EPMM vulnerability, tracked as CVE-2023-35081. 

This bug required an intruder to be logged-in as an administrator to upload arbitrary files to an EPMM web app server. Someone could use this to upload a webshell to a vulnerable server and remotely control the backdoored box, if they able to obtain admin login credentials or escalated privileges via another flaw (the aforementioned CVE-2023-35078, say?)

Neither Ivanti nor any of the government agencies investigating the intrusions have yet to attribute any of these exploits to a nation-state or criminal gang, so far. ®

Send us news
7 Comments

Cisco's Smart Licensing Utility flaws suggest it's pretty dumb on security

Two critical holes including hardcoded admin credential

GPT apps fail to disclose data collection, study finds

Researchers say that implementing Actions omit privacy details and expose info

Rust for Linux maintainer steps down in frustration with 'nontechnical nonsense'

Community seems to C Rust more as a burden than a benefit

Rock Chrome hard enough and get paid half a million

Google revises Chrome Vulnerability Rewards Program with higher payouts for bug hunters

Top companies ground Microsoft Copilot over data governance concerns

Securiti's Jack Berkowitz polled 20-plus CDOs, and half have hit pause

SolarWinds left critical hardcoded credentials in its Web Help Desk product

Why go to the effort of backdooring code when devs will basically do it for you accidentally anyway

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

This uni thought it would be a good idea to do a phishing test with a fake Ebola scare

Needless to say, it backfired in a big way

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Slack AI can be tricked into leaking data from private channels via prompt injection

Whack yakety-yak app chaps rapped for security crack

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming