MobileIron Core 10.3.0.x < 10.3.0.4-19 / 10.4.0.x < 10.4.0.4-22 / 10.5.1.1 < 10.5.1.1-22 / 10.5.2.1 < 10.5.2.1-14 / 10.6.0.1 < 10.6.0.1-19 / 10.7.0.0 < 10.7.0.0-28

critical Nessus Plugin ID 141366

Synopsis

A MobileIron application running on the remote web server is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the installation of MobileIron Core on the remote host is affected by multiple vulnerabilities:

- A remote command execution vulnerability exists in MobileIron Core and Connector versions 10.6 and earlier, and Sentry versions 9.8 and earlier. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands as root. (CVE-2020-15505)

- An arbitrary file read vulnerability exists in MobileIron Core and Connector versions 10.6 and earlier. An unauthenticated, remote attacker can exploit this to read arbitrary files and disclose sensitive information. (CVE-2020-15507)

- An authentication bypass vulnerability exists in MobileIron Core and Connector versions 10.6 and earlier. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary actions with escalated privileges. (CVE-2020-15506) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version

Solution

Upgrade to MobileIron version 10.3.0.4-19, 10.4.0.4-22, 10.5.1.1-22, 10.5.2.1-14, 10.6.0.1-19, 10.7.0.0-28 or later.

See Also

http://www.nessus.org/u?9a8249df

Plugin Details

Severity: Critical

ID: 141366

File Name: mobileiron_10_3_0_4_19.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 10/12/2020

Updated: 12/5/2022

Configuration: Enable thorough checks

Risk Information

VPR

Risk Factor: Critical

Score: 9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2020-15506

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mobileiron:mobileiron_core

Required KB Items: installed_sw/MobileIron Core

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/15/2020

Vulnerability Publication Date: 6/11/2020

CISA Known Exploited Dates: 5/3/2022

Exploitable With

Metasploit (MobileIron MDM Hessian-Based Java Deserialization RCE)

Reference Information

CVE: CVE-2020-15505, CVE-2020-15506, CVE-2020-15507

IAVA: 2020-A-0424

CEA-ID: CEA-2020-0129