Executive Risk Summary
"A security vulnerability in Ivanti MobileIron Sentry's MICS Admin Portal allows an attacker to bypass authentication controls due to an insufficiently restrictive Apache HTTPD configuration, potentially leading to unauthorized access and remote code execution. This vulnerability affects Ivanti MobileIron Sentry versions 9.18.0 and below."
Operational Audit Arsenal
Target Type Configuration File
Target Asset httpd.conf
Standard Path Apache HTTPD configuration directory
Manual Verification Required
This is a non-Windows asset (Ivanti). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Reboot Required Likely
Moderate, as the patch may require restarting the Apache HTTPD service
Internal Work Notes
CVE-2023-38035: Ivanti MobileIron Sentry MICS Admin Portal authentication bypass vulnerability, requiring patching to prevent unauthorized access and remote code execution
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Official Advisoryhttp://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html
Official Advisoryhttps://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface
Official Advisoryhttp://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html
Official Advisoryhttps://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface
Official Advisoryhttps://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38035
Related Ivanti Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.