CVE-2023-35082 – Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2023-35082
An authentication bypass vulnerability in Ivanti EPMM 11.10 and older, allows unauthorized users to access restricted functionality or resources of the application without proper authentication. This vulnerability is unique to CVE-2023-35078 announced earlier. Una vulnerabilidad de omisión de autenticación en Ivanti EPMM 11.10 y versiones anteriores permite a usuarios no autorizados acceder a funciones o recursos restringidos de la aplicación sin la autenticación adecuada. Esta vulnerabilidad es exclusiva de CVE-2023-35078 anunciada anteriormente. Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application. • https://github.com/Chocapikk/CVE-2023-35082 https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older?language=en_US • CWE-287: Improper Authentication •
CVE-2023-28129
https://notcve.org/view.php?id=CVE-2023-28129
DSM 2022.2 SU2 and all prior versions allows a local low privileged account to execute arbitrary OS commands as the DSM software installation user. • https://forums.ivanti.com/s/article/SA-2023-07-26-CVE-2023-28129 •
CVE-2023-32560 – Ivanti Avalanche <v6.4.0.0 - Remote Code Execution
https://notcve.org/view.php?id=CVE-2023-32560
An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution. Thanks to a Researcher at Tenable for finding and reporting. Fixed in version 6.4.1. Ivanti Avalanche versions prior to 6.4.0.0 suffer from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/51699 https://github.com/x0rb3l/CVE-2023-32560 http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US https://www.tenable.com/security/research/tra-2023-27 https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1 • CWE-787: Out-of-bounds Write •
CVE-2023-32561 – Ivanti Avalanche dumpHeap Incorrect Permission Assignment Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2023-32561
A previously generated artifact by an administrator could be accessed by an attacker. The contents of this artifact could lead to authentication bypass. Fixed in version 6.4.1. This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche. Authentication is not required to exploit this vulnerability. The specific flaw exists within the dumpHeap method. • https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US •
CVE-2023-32562 – Ivanti Avalanche FileStoreConfig Arbitrary File Upload Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-32562
An unrestricted upload of file with dangerous type vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to achieve a remove code execution. Fixed in version 6.4.1. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche. Authentication is required to exploit this vulnerability. The specific flaw exists within the FileStoreConfig endpoint. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. • https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US • CWE-434: Unrestricted Upload of File with Dangerous Type •