
Single IP Dominates Exploitation Campaign Attacking Ivanti EPMM with RCE Vulnerability
In the relentless battle against cyber threats, a single, critical remote code execution (RCE) flaw in Ivanti Endpoint Manager Mobile (EPMM) has emerged as a significant concern, with a disproportionate amount of exploitative activity tracing back to one specific IP address. This particular vulnerability, identified as CVE-2023-35078, presents a severe risk to organizations utilizing Ivanti EPMM, formerly known as MobileIron Core.
The cybersecurity community is witnessing an intensified exploitation campaign, where a dominant portion of observed attacks originate from a single, rather notorious, IP address. Understanding the mechanics of this exploitation, the characteristics of the attacker’s infrastructure, and crucially, how to defend against these assaults, is paramount for maintaining robust organizational security.
The Critical Flaw: CVE-2023-35078 Explained
The Ivanti Endpoint Manager Mobile (EPMM) platform, a widely used solution for managing mobile devices and applications, contains a critical authentication bypass vulnerability, CVE-2023-35078. This flaw, with a CVSS score indicating high severity, allows an unauthenticated attacker to gain access to sensitive API endpoints. Successful exploitation could lead to arbitrary file write capabilities, ultimately culminating in remote code execution on the afflicted Ivanti EPMM instances.
The ability for an unauthenticated user to achieve RCE means that an attacker, without needing any prior credentials or access, can execute malicious code directly on the vulnerable server. This level of access grants the attacker immense control, potentially leading to data exfiltration, system compromise, or lateral movement within an organization’s network.
The Dominant Attacker: 193[.]24[.]123[.]42
Observations from cybersecurity incident response firm GreyNoise reveal a striking concentration of attack activity. A significant 83% of all observed exploitation attempts targeting CVE-2023-35078 originate from one specific IP address: 193[.]24[.]123[.]42. This singular focus indicates either a highly organized attacker or a group leveraging a centralized command-and-control infrastructure for their campaign.
Further investigation into this IP address uncovers concerning details. It is registered to PROSPERO OOO (AS200593), an entity that cybersecurity researchers at Censys have previously categorized as providing “bulletproof” hosting. Bulletproof hosting services are notorious for ignoring abuse complaints and accommodating malicious actors, making them a preferred choice for cybercriminals who wish to operate with relative impunity.
The fact that this prominent IP address was initially missing from public threat intelligence feeds underscores the dynamic nature of these campaigns. It highlights the importance of real-time threat intelligence and continuous monitoring to identify and block emerging threats.
Understanding RCE Vulnerabilities and Their Impact
Remote Code Execution (RCE) vulnerabilities are among the most critical flaws in software security. They empower attackers to execute arbitrary commands or code on a remote system, effectively giving them full control over the compromised machine. The implications of a successful RCE attack, particularly on a widely deployed mobile device management (MDM) solution like Ivanti EPMM, are profound:
- Data Breach: Attackers can access, steal, or delete sensitive corporate and personal data.
- System Compromise: The compromised system can be repurposed for other malicious activities, such as launching further attacks, hosting malware, or acting as a pivot point for network intrusion.
- Denial of Service: Attackers can disrupt or disable critical services, impacting business operations.
- Reputational Damage: A successful breach can severely damage an organization’s reputation and customer trust.
Remediation Actions and Proactive Defense
Organizations using Ivanti EPMM must act immediately to mitigate the risks associated with CVE-2023-35078. The ongoing exploitation campaign necessitates a swift and comprehensive response.
Immediate Steps:
- Patch Immediately: Apply all available security patches and updates from Ivanti for EPMM. Ensure your system runs the latest, patched version.
- Isolate and Segment: Implement network segmentation to limit the potential blast radius if an Ivanti EPMM instance is compromised. Isolate EPMM systems from critical internal networks.
- Review Logs for Compromise: Scrutinize Ivanti EPMM logs for any indicators of compromise (IoCs), including unusual API calls, unauthorized access attempts, or unexpected file modifications.
- Block Malicious IP: Add 193[.]24[.]123[.]42 to your network’s an allow-list on firewalls, intrusion prevention systems (IPS), and web application firewalls (WAFs).
- Implement Strong Authentication: Ensure multi-factor authentication (MFA) is enabled for all administrative interfaces and user accounts associated with Ivanti EPMM.
Long-Term Security Posture Improvements:
- Regular Vulnerability Scanning: Conduct routine vulnerability assessments and penetration tests to identify and address weaknesses before attackers can exploit them.
- Endpoint Detection and Response (EDR): Deploy EDR solutions on servers hosting Ivanti EPMM to detect and respond to suspicious activities in real-time.
- Threat Intelligence Feeds: Subscribe to and integrate reputable threat intelligence feeds to stay abreast of emerging threats and attacker infrastructure.
- Security Awareness Training: Educate IT staff and end-users about phishing, social engineering, and the importance of reporting suspicious activities.
Recommended Tools for Detection and Mitigation
Leveraging appropriate cybersecurity tools can significantly enhance your ability to detect, prevent, and respond to threats posed by vulnerabilities like CVE-2023-35078.
| Tool Name | Purpose | Link |
|---|---|---|
| Nessus | Comprehensive vulnerability scanning and assessment. | https://www.tenable.com/products/nessus |
| Snort/Suricata | Intrusion Detection/Prevention Systems (IDS/IPS) for network traffic analysis and signature-based threat detection. | https://www.snort.org/ https://suricata-ids.org/ |
| Splunk/ELK Stack | Security Information and Event Management (SIEM) for log aggregation, analysis, and threat hunting. | https://www.splunk.com/ https://www.elastic.co/elastic-stack |
| GreyNoise Intelligence | Contextual threat intelligence for filtering out benign internet noise and identifying targeted attacks. | https://greynoise.io/ |
Conclusion
The focused exploitation of Ivanti EPMM’s CVE-2023-35078 by a single, “bulletproof” hosted IP address serves as a stark reminder of the persistent and evolving threat landscape. Organizations must prioritize immediate patching, implement robust security controls, and leverage threat intelligence to defend against these critical vulnerabilities. Proactive defense and a diligent approach to security hygiene are not just best practices; they are essential for avoiding costly breaches and maintaining operational integrity.


