CVE-2023-35082 Scanner
Detects 'Authentication Bypass' vulnerability in Ivanti EPMM affects v. 11.10 and before.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
2 months 25 days
Scan only one
URL
Toolbox
-
Ivanti Endpoint Manager (EPM) is a platform widely used for the purpose of endpoint management, which is the process of securing and managing devices connected to a network. These devices can include computers, mobile devices, and other endpoints. Ivanti EPM is an all-in-one solution designed to simplify the management of endpoints and automate IT tasks. The platform enables efficient software distribution, remote control of endpoints, patch management, and asset management across multiple platforms.
CVE-2023-35082 is an authentication bypass vulnerability discovered in Ivanti EPM 11.10 and older versions. This vulnerability allows unauthorized users to gain access to restricted functionalities and resources of the application without proper authentication. Attackers can exploit this vulnerability to perform malicious activities such as executing unauthorized administrative actions, compromising sensitive data, and deploying malware across the network.
When exploited, this vulnerability can ultimately lead to the complete compromise of an organization's network. Attackers with unauthorized access can steal valuable data leading to financial loss, legal liabilities, and reputational damage. Additionally, an attacker with access to the Ivanti EPM platform can also execute unauthorized administrative actions and carry out destructive activities such as deleting important files and data.
Thanks to the pro features of s4e.io, individuals can quickly and easily learn about vulnerabilities in their digital assets and take steps to secure them. The platform provides comprehensive cybersecurity solutions to prevent and detect potential security risks, protecting both individuals and organizations from attacks and data breaches. By staying informed on security risks and taking proactive measures to mitigate them, users can ensure that their digital assets remain safe and secure.
REFERENCES