{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-38035","assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","state":"PUBLISHED","assignerShortName":"hackerone","dateReserved":"2023-07-12T01:00:11.880Z","datePublished":"2023-08-21T16:51:20.678Z","dateUpdated":"2025-10-21T23:05:40.307Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration."}],"affected":[{"defaultStatus":"unaffected","vendor":"Ivanti","product":"MobileIron Sentry","versions":[{"version":"9.18.0 and below","status":"affected","lessThan":"9.18.0 and below","versionType":"custom"}]}],"references":[{"url":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface"},{"url":"http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html"}],"providerMetadata":{"orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone","dateUpdated":"2023-09-13T17:06:24.335Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2023-38035","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-07-16T03:55:31.632449Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2023-08-22","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38035"}}}],"affected":[{"cpes":["cpe:2.3:a:ivanti:mobileiron_sentry:*:*:*:*:*:*:*:*"],"vendor":"ivanti","product":"mobileiron_sentry","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"9.18.0"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-38035","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-863","description":"CWE-863 Incorrect Authorization"}]}],"timeline":[{"time":"2023-08-22T00:00:00.000Z","lang":"en","value":"CVE-2023-38035 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:40.307Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:30:12.367Z"},"title":"CVE Program Container","references":[{"url":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html","tags":["x_transferred"]}]}]}}