MobileIron – According to a new advisory, MobileIron’s mobile device management security solutions are currently under attack by Advanced persistent threat (APT) groups trying to exploit an RCE vulnerability.
The CVE (CVE-2020-15505) has been identified as a remote code-execution flaw and has been given a 9.8 out of 10 on the CVSS severity scale, making it critical.
This flaw was patched last June, but a brand new PoC was published back in September, allowing Criminal Hackers and State sponsored actors alike to exploit it.
According to the NCSC: “These actors typically scan victim networks to identify vulnerabilities, including CVE-2020-15505, to be used during targeting, in some cases, when the latest updates are not installed, they have successfully compromised systems.”.
The UK Government, through its official cyber security agency said that the healthcare, local government, logistics and legal sectors have all been targeted – but others could also be affected.
The news wasn’t ignored on the other side of the atlantic as well, with the Cybersecurity and Infrastructure Security Agency (CISA) in October warned that APT groups are exploiting the MobileIron flaw in combination with the severe Microsoft Windows Netlogon/Zerologon vulnerability (CVE-2020-1472).
Why is this MobileIron flaw dangerous?
First reported to MobileIron by DEVCORE, this vulnerability is a straightforward RCE that could allow an attacker to execute remote exploits without authentication.
The criticality exists across various components of MobileIron platform such as MobileIron Core, a component of the MobileIron platform that serves as the administrative console; or in MobileIron Connector, a component that adds real-time connectivity to the backend.
Also impacted is Sentry, as reported, an in-line gateway that manages, encrypts and secures traffic between the mobile-device and back-end enterprise systems; and Monitor and Reporting Database, which provides comprehensive performance management functionality.
The bug affects Core and Connector versions:
- 10.3.0.3 and earlier;
- and 10.6.0.0;
Also affected, Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 18.104.22.168 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.
MobileIron, for its part, said in an update this week that it has been engaging in “proactive outreach to help customers secure their systems,” and estimates that 90 to 95 percent of all devices are now managed on patched/updated versions of software.
While the company said it will continue to follow up with the remaining customers where we can determine that they have not yet patched affected products, it strongly urges companies to make sure they are updated.
“MobileIron strongly recommends that customers apply these patches and any security updates as soon as possible,” said the company in its security update.