What is Ivanti Endpoint Manager Mobile (EPMM)?
Ivanti Endpoint Manager Mobile (EPMM), formerly branded as MobileIron Core, is an enterprise Mobile Device Management (MDM) platform used by organizations to centrally manage and secure smartphones, tablets, and other mobile devices across their workforce. It is widely deployed in government agencies, healthcare organizations, and large enterprises to enforce mobile security policies, distribute applications, and manage device compliance.
Key functions include:
- Device enrollment and lifecycle management — provision, configure, and retire corporate and BYOD mobile devices
- Policy enforcement — push security policies (encryption, screen lock, app restrictions) to enrolled devices
- Application management — distribute, update, and remotely wipe enterprise applications from a central console
- VPN and network access — configure and distribute VPN profiles and certificates to managed endpoints
- Compliance monitoring — continuously assess enrolled device posture and flag non-compliant devices
EPMM and its predecessor MobileIron Core are typically deployed as on-premises appliances with management interfaces exposed to the internet for device check-ins. Many organizations running older end-of-life MobileIron Core versions — particularly government agencies and healthcare organizations with long refresh cycles — were particularly exposed by CVE-2023-35082, which specifically targeted versions that had already passed vendor support end-of-life dates.
Overview
CVE-2023-35082 is a critical authentication bypass vulnerability (CWE-287) affecting Ivanti EPMM and MobileIron Core that allows unauthenticated remote attackers to access API endpoints on an exposed management server. It is a closely related variant of CVE-2023-35078 and was discovered while investigating that earlier vulnerability.
CVE-2023-35082 was initially reported as affecting only MobileIron Core version 11.2 and earlier — the legacy, unsupported predecessor to EPMM — but Ivanti's subsequent investigation found additional exploitation paths affecting all EPMM versions 11.10, 11.9, and 11.8 as well. Because MobileIron Core 11.2 reached end-of-life in March 2022, Ivanti did not release a direct patch for end-of-life versions, leaving organizations on unsupported releases with no vendor-supported remediation path other than upgrading to a current EPMM version.
The vulnerability was added to the CISA KEV catalog in January 2024 — approximately five months after public disclosure — confirming that exploitation was ongoing well after the initial disclosure period. When chained with CVE-2023-35081, attackers can escalate from unauthenticated API access to webshell deployment and remote code execution.
Affected Versions
| Product / Version | Vulnerable | Remediation |
|---|---|---|
| EPMM 11.10.x | Yes | Apply RPM mitigation script (August 2023); upgrade to 11.11 for permanent fix |
| EPMM 11.9.x | Yes | Apply RPM mitigation script |
| EPMM 11.8.x | Yes | Apply RPM mitigation script |
| EPMM 11.3.x through 11.7.x | Yes | Apply RPM mitigation script |
| MobileIron Core 11.2 and earlier | Yes (end-of-life) | No patch available — upgrade to supported EPMM version |
| EPMM 11.11 | Not affected | Permanent fix included in this release |
| Ivanti Neurons for MDM (cloud) | Not affected | — |
Ivanti released RPM mitigation scripts for versions 11.10 through 11.3. MobileIron Core 11.2 and older reached end-of-life on March 15, 2022, and will not receive a patch; operators must upgrade to a supported EPMM version.
Technical Details
CVE-2023-35082 is structurally similar to CVE-2023-35078 — both are improper authentication vulnerabilities (CWE-287) that expose EPMM API endpoints without requiring valid credentials. The vulnerability allows a remote unauthenticated attacker to access API endpoints on an exposed management server by crafting requests that bypass the authentication enforcement layer.
Exploiting the API access, an attacker can:
- Access and extract personally identifiable information (PII) including names, phone numbers, email addresses, and mobile device identifiers for enrolled users
- Perform configuration modifications on the EPMM platform
- Leverage the access as a stepping stone for further exploitation
Relationship to CVE-2023-35078: While CVE-2023-35078 and CVE-2023-35082 are distinct CVEs, they represent the same class of flaw — missing or insufficient authentication enforcement on API paths. CVE-2023-35082 was discovered by Rapid7 while investigating CVE-2023-35078, suggesting the root cause exists in a common authentication control layer. Ivanti's expanded advisory (August 7, 2023) revealed that CVE-2023-35082 affected a broader range of versions than initially understood.
Chaining with CVE-2023-35081: CVE-2023-35081 (path traversal / arbitrary file write) can be chained with CVE-2023-35082 in the same way it chains with CVE-2023-35078 — using the authentication bypass to gain effective administrator-level access, then using the file write primitive to deploy a webshell for persistent remote code execution.
Attack characteristics:
- No credentials or prior access required
- Exploitable over the internet against any exposed EPMM or MobileIron Core management interface
- Particularly impactful for organizations on end-of-life MobileIron Core versions with no patch available
Discovery
CVE-2023-35082 was discovered by Rapid7 while investigating CVE-2023-35078. Rapid7 reported the vulnerability to Ivanti on July 26, 2023, and published their disclosure blog on August 2, 2023. The initial disclosure described the affected scope as MobileIron Core 11.2 and earlier; Ivanti subsequently updated its advisory on August 7, 2023, to document the broader impact across current EPMM versions.
Exploitation Context
CVE-2023-35082 was added to the CISA KEV catalog on January 18, 2024 — approximately five months after public disclosure — indicating continued active exploitation:
- Delayed KEV addition: The five-month gap between public disclosure (August 2023) and KEV addition (January 2024) suggests that exploitation was identified or confirmed well after the initial patch cycle, likely targeting organizations that had not yet remediated despite prior disclosure.
- End-of-life version exposure: The vulnerability disproportionately affected organizations running MobileIron Core 11.2 and earlier — versions that had already passed end-of-life in March 2022 and for which no patch exists, leaving administrators with no option other than a full platform upgrade.
- Chaining risk: When combined with CVE-2023-35081, CVE-2023-35082 provides an unauthenticated path to arbitrary file write and webshell deployment, enabling persistent RCE on compromised EPMM appliances.
- Continued EPMM targeting: The exploitation of CVE-2023-35082 fits into a sustained pattern of nation-state and criminal threat actor interest in Ivanti EPMM, following the Norwegian government campaign that exploited CVE-2023-35078 and CVE-2023-35081.
Remediation
- Apply RPM mitigation scripts — for EPMM versions 11.10 through 11.3, apply the Ivanti-provided RPM scripts released in August 2023
- Upgrade to EPMM 11.11 or later — the permanent fix for CVE-2023-35082 is included in EPMM 11.11; RPM scripts are a temporary mitigation, not a permanent fix
- Upgrade from end-of-life MobileIron Core — organizations on MobileIron Core 11.2 and earlier have no patch available; the only remediation is upgrading to a current EPMM release
- Also address CVE-2023-35081 — the path traversal companion vulnerability must be patched separately to eliminate the webshell-deployment attack chain
- Restrict internet access to the management interface — EPMM and MobileIron Core management interfaces should not be directly reachable from the public internet; implement VPN gateways or firewall ACLs limiting access to known IP ranges
- Review API access logs — examine server logs for unauthenticated requests to EPMM API endpoints; patterns consistent with CVE-2023-35082 exploitation are detectable through log review
- Hunt for webshells and persistence mechanisms — if compromise is suspected, search for unexpected JSP files in EPMM web-accessible directories and audit the system for post-exploitation artifacts
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2023-35082 |
| Vendor / Product | Ivanti — Endpoint Manager Mobile (EPMM) and MobileIron Core |
| NVD Published | 2023-08-15 |
| NVD Last Modified | 2025-10-31 |
| CVSS 3.1 Score | 9.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-287 |
| CISA KEV Added | 2024-01-18 |
| CISA KEV Deadline | 2024-02-08 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2023-07-26 | Rapid7 reports CVE-2023-35082 to Ivanti while investigating CVE-2023-35078 |
| 2023-08-02 | Rapid7 publishes disclosure blog; vulnerability initially described as affecting MobileIron Core 11.2 and prior only |
| 2023-08-03 | CVE-2023-35082 formally published to NVD |
| 2023-08-07 | Ivanti updates advisory to confirm CVE-2023-35082 also affects EPMM 11.10, 11.9, 11.8, and MobileIron Core 11.7 and below |
| 2023-08-15 | Ivanti releases RPM mitigation scripts for EPMM versions 11.10 through 11.3 |
| 2024-01-18 | CISA adds CVE-2023-35082 to the Known Exploited Vulnerabilities catalog following confirmed active exploitation |
| 2024-02-08 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2023-35082 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Ivanti Security Advisory — CVE-2023-35082 | Vendor Advisory |
| CVE-2023-35082 Vulnerability Affecting EPMM and MobileIron Core — Ivanti Blog | Vendor Advisory |
| CVE-2023-35082: MobileIron Core Unauthenticated API Access — Rapid7 Blog | Security Research |
| Ivanti EPMM and MobileIron Core vulnerability is actively exploited, CISA confirms — Help Net Security | News |
| Ivanti discloses another vulnerability in MobileIron Core (CVE-2023-35082) — Help Net Security | News |
| Ivanti EPMM API Authentication Bypass (CVE-2023-35078/CVE-2023-35082) — Acunetix | Security Research |