Home Ivanti CVE-2023-38035
CRITICAL: THIS VULNERABILITY IS ACTIVELY BEING EXPLOITED IN THE WILD (CISA KEV CATALOG)
Back to Ivanti

CVE-2023-38035

Exploited

Ivanti MobileIron Sentry - MICS Admin Portal

Ivanti CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"A security vulnerability in Ivanti MobileIron Sentry's MICS Admin Portal allows an attacker to bypass authentication controls due to an insufficiently restrictive Apache HTTPD configuration, potentially leading to unauthorized access and remote code execution. This vulnerability affects Ivanti MobileIron Sentry versions 9.18.0 and below."

Operational Audit Arsenal

Target Type Configuration File
Target Asset httpd.conf
Standard Path Apache HTTPD configuration directory

Manual Verification Required

This is a non-Windows asset (Ivanti). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate, as the patch may require restarting the Apache HTTPD service

Internal Work Notes

CVE-2023-38035: Ivanti MobileIron Sentry MICS Admin Portal authentication bypass vulnerability, requiring patching to prevent unauthorized access and remote code execution

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.