By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: MobileIron: RCE flaw under attack
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > MobileIron: RCE flaw under attack
MobileIron
News

MobileIron: RCE flaw under attack

Last updated: 2020/11/27 at 9:51 AM
Jim Koohyar Biniyaz Published November 27, 2020
Share
SHARE

MobileIron – According to a new advisory, MobileIron’s mobile device management security solutions are currently under attack by Advanced persistent threat (APT) groups trying to exploit an RCE vulnerability.

Contents
Why is this MobileIron flaw dangerous?Remediation

The CVE (CVE-2020-15505) has been identified as a remote code-execution flaw and has been given a 9.8 out of 10 on the CVSS severity scale, making it critical.

This flaw was patched last June, but a brand new PoC was published back in September, allowing Criminal Hackers and State sponsored actors alike to exploit it.

According to the NCSC: “These actors typically scan victim networks to identify vulnerabilities, including CVE-2020-15505, to be used during targeting, in some cases, when the latest updates are not installed, they have successfully compromised systems.”.

The UK Government, through its official cyber security agency said that the healthcare, local government, logistics and legal sectors have all been targeted – but others could also be affected.

The news wasn’t ignored on the other side of the atlantic as well, with the Cybersecurity and Infrastructure Security Agency (CISA) in October warned that APT groups are exploiting the MobileIron flaw in combination with the severe Microsoft Windows Netlogon/Zerologon vulnerability (CVE-2020-1472).

Why is this MobileIron flaw dangerous?

First reported to MobileIron by DEVCORE, this vulnerability is a straightforward RCE that could allow an attacker to execute remote exploits without authentication.

The criticality exists across various components of MobileIron platform such as MobileIron Core, a component of the MobileIron platform that serves as the administrative console; or in MobileIron Connector, a component that adds real-time connectivity to the backend.

Also impacted is Sentry, as reported, an in-line gateway that manages, encrypts and secures traffic between the mobile-device and back-end enterprise systems; and Monitor and Reporting Database, which provides comprehensive performance management functionality.

The bug affects Core and Connector versions:

  • 10.3.0.3 and earlier;
  • 10.4.0.0,
  • 10.4.0.1,
  • 10.4.0.2,
  • 10.4.0.3,
  • 10.5.1.0,
  • 10.5.2.0,
  • and 10.6.0.0;

Also affected, Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.

Remediation

MobileIron, for its part, said in an update this week that it has been engaging in “proactive outreach to help customers secure their systems,” and estimates that 90 to 95 percent of all devices are now managed on  patched/updated versions of software.

While the company said it will continue to follow up with the remaining customers where we can determine that they have not yet patched affected products, it strongly urges companies to make sure they are updated.

“MobileIron strongly recommends that customers apply these patches and any security updates as soon as possible,” said the company in its security update.

Weekly Updates For Our Loyal Readers!

Jim Koohyar Biniyaz November 27, 2020
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?