Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-text-to-speech domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-bookmark-follow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the soledad domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-paywall domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the penci-frontend-submission domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/revifuxl/hacksbyte.com/wp-includes/functions.php on line 6114
Ivanti warns of another Endpoint Manager Mobile vulnerability under active attack – HacksByte

Ivanti warns of another Endpoint Manager Mobile vulnerability under active attack

Ivanti has disclosed yet another security flaw affecting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, saying it was exposed in the wild by malicious actors as part of an exploit chain.

by Vikash Kumawat
0 comments 224 views

The new vulnerability, tracked as CVE-2023-35081 (CVSS score: 7.8), affects supported versions 11.10, 11.9 and 11.8 as well as versions that are currently at end-of-life (EOL). 

“CVE-2023-35081 enables an authenticated administrator to write an arbitrary file on an EPMM server,” the company said in an advisory. “This vulnerability can be used in conjunction with CVE-2023-35078 to bypass administrator authentication and ACLs restrictions (if applicable).”

A successful exploit could allow a threat actor to write arbitrary files to the appliance, thereby enabling the malicious party to execute OS commands as the Tomcat user on the appliance.

“At this time, we are aware of the same limited number of customers affected by CVE-2023-35078 as those affected by CVE-2023-35081,” the company said.

It is worth noting that CVE-2023-35078 is a critical remote unauthenticated API access vulnerability that allows remote attackers to obtain sensitive information, add an EPMM administrative account, and change configuration due to authentication bypass.

Security flaws have been exploited by unknown actors targeting Norwegian government entities, prompting the US Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert urging users and organizations to implement the latest fixes.

The development comes as the Google Project Zero team said that 41 in-the-wild 0-days have been detected and disclosed in 2022, down from 69 in 2021, noting that 17 of those The first were the types of public vulnerabilities.

Google TAG researcher Maddy Stone said, “Similar to the overall number, the number of in-the-wild 0-days targeting browsers declined by 42% from 2021 to 2022, from 26 to 15.”

“Our assessment is that this reflects browser efforts to make exploits more difficult overall as well as a shift in attacker behavior away from browsers toward zero-click exploits that target other components on the device.”

You may also like

Leave a Comment

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00