INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 43m Global general Financial Services and E-commerce MEDIUM 45m Global data_breach Social Media and Communications CRITICAL 58m Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 43m Global general Financial Services and E-commerce MEDIUM 45m Global data_breach Social Media and Communications CRITICAL 58m Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 43m Global general Financial Services and E-commerce MEDIUM 45m Global data_breach Social Media and Communications CRITICAL 58m Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2023-38035

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Ivanti Sentry Authentication Bypass Vulnerability — Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authenticat
Published: Aug 22, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Ivanti Sentry Authentication Bypass Vulnerability — Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

🤖 AI Executive Summary

CVE-2023-38035 is a critical authentication bypass vulnerability (CVSS 9.0) in Ivanti Sentry (formerly MobileIron Sentry) that allows unauthenticated attackers to access the administrative interface by exploiting an insufficiently restrictive Apache HTTPD configuration. A confirmed public exploit exists, making this an actively weaponizable threat requiring immediate attention. Successful exploitation grants attackers administrative control over the Sentry gateway, which acts as a critical broker between mobile devices and enterprise backend systems. This vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog, indicating active in-the-wild exploitation.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 17, 2026 06:34
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations heavily reliant on mobile device management (MDM) and enterprise mobility solutions are at significant risk. Key sectors include: (1) Banking/SAMA-regulated entities — major Saudi banks and financial institutions using Ivanti Sentry to secure mobile banking operations and BYOD programs face risk of complete administrative compromise; (2) Government/NCA — ministries and government agencies using MobileIron/Ivanti for secure mobile access to classified or sensitive systems are highly exposed; (3) Energy/ARAMCO and SABIC — operational technology environments with mobile workforce management using Sentry as a gateway could face lateral movement into critical infrastructure; (4) Telecom/STC and Zain — large mobile workforces managed through Ivanti Sentry represent a high-value target; (5) Healthcare — hospitals and health authorities using mobile clinical workflows secured by Sentry risk patient data exposure. The administrative bypass could allow attackers to reconfigure Sentry to intercept mobile traffic, push malicious configurations to enrolled devices, or pivot into internal enterprise networks — a particularly severe risk given Saudi Arabia's Vision 2030 digital transformation initiatives expanding mobile workforce footprints.
🏢 Affected Saudi Sectors
Banking Government Energy Telecom Healthcare Defense Education Retail
⚖️ Saudi Risk Score (AI)
9.4
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (Within 24 hours):
1. Isolate Ivanti Sentry administrative interfaces (port 8443/MICS) from public internet access immediately — restrict to trusted management networks only via firewall ACLs.
2. Audit all Sentry administrative access logs for unauthorized access attempts or configuration changes since July 2023.
3. Check for indicators of compromise: unexpected admin account creation, modified Sentry configurations, unusual outbound connections from Sentry appliances.
4. Disable or restrict access to the System Manager portal if not actively required.

PATCHING GUIDANCE:
5. Apply Ivanti's official patches immediately — RPM scripts are available for Sentry versions 9.18, 9.17, 9.16, and 9.15. Versions 9.14 and below require upgrade to a supported version first.
6. Follow Ivanti's KB article (KB API-0029) for patch application procedures specific to your version.
7. After patching, rotate all administrative credentials and API keys associated with Sentry.

COMPENSATING CONTROLS (If patching is delayed):
8. Implement strict network segmentation — block all external access to Sentry MICS (port 8443) at the perimeter firewall.
9. Deploy WAF rules to block requests targeting /mics/ and /mics/services/ endpoints from untrusted sources.
10. Enable enhanced logging on Apache HTTPD and forward to SIEM for anomaly detection.

DETECTION RULES:
11. SIEM Alert: Detect unauthenticated HTTP 200 responses to /mics/services/ endpoints.
12. IDS/IPS Signature: Flag POST requests to Sentry administrative URIs from non-whitelisted IP ranges.
13. Monitor for new admin account creation events in Sentry audit logs.
14. Threat hunt for lateral movement from Sentry appliance IP addresses to internal systems.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 24 ساعة):
1. عزل واجهات إدارة Ivanti Sentry (المنفذ 8443/MICS) عن الإنترنت العام فوراً — تقييد الوصول إلى شبكات الإدارة الموثوقة فقط عبر قوائم التحكم في الوصول بجدار الحماية.
2. مراجعة جميع سجلات الوصول الإداري لـ Sentry للكشف عن محاولات وصول غير مصرح بها أو تغييرات في التكوين منذ يوليو 2023.
3. التحقق من مؤشرات الاختراق: إنشاء حسابات إدارية غير متوقعة، تعديلات في تكوينات Sentry، اتصالات صادرة غير معتادة من أجهزة Sentry.
4. تعطيل أو تقييد الوصول إلى بوابة System Manager إذا لم تكن مطلوبة بشكل فعلي.

إرشادات التصحيح:
5. تطبيق التصحيحات الرسمية من Ivanti فوراً — تتوفر نصوص RPM لإصدارات Sentry 9.18 و9.17 و9.16 و9.15. الإصدارات 9.14 وما دونها تتطلب الترقية أولاً إلى إصدار مدعوم.
6. اتباع مقالة قاعدة المعرفة من Ivanti (KB API-0029) لإجراءات تطبيق التصحيح الخاصة بإصدارك.
7. بعد التصحيح، تدوير جميع بيانات اعتماد المسؤولين ومفاتيح API المرتبطة بـ Sentry.

ضوابط التعويض (في حالة تأخر التصحيح):
8. تطبيق تجزئة صارمة للشبكة — حظر جميع الوصول الخارجي إلى MICS الخاص بـ Sentry (المنفذ 8443) على جدار الحماية المحيطي.
9. نشر قواعد WAF لحظر الطلبات التي تستهدف نقاط النهاية /mics/ و/mics/services/ من المصادر غير الموثوقة.
10. تفعيل التسجيل المحسّن على Apache HTTPD وإرساله إلى SIEM للكشف عن الشذوذات.

قواعد الكشف:
11. تنبيه SIEM: الكشف عن استجابات HTTP 200 غير مصادق عليها لنقاط نهاية /mics/services/.
12. توقيع IDS/IPS: الإشارة إلى طلبات POST لعناوين URI الإدارية لـ Sentry من نطاقات IP غير مدرجة في القائمة البيضاء.
13. مراقبة أحداث إنشاء حسابات المسؤولين الجديدة في سجلات تدقيق Sentry.
14. البحث عن الحركة الجانبية من عناوين IP لأجهزة Sentry إلى الأنظمة الداخلية.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity requirements for protecting systems from unauthorized access ECC-2-3-1: Access control and authentication management ECC-2-5-1: Secure configuration management for network devices and systems ECC-2-6-1: Vulnerability and patch management — critical patches within defined SLA ECC-3-3-1: Network security and perimeter protection controls ECC-2-9-1: Mobile device management security requirements
🔵 SAMA CSF
3.3.4 — Access Control: Ensuring authentication mechanisms are enforced for administrative interfaces 3.3.6 — Vulnerability Management: Timely patching of critical vulnerabilities in financial infrastructure 3.3.7 — Network Security: Restricting administrative access to trusted network segments 3.4.2 — Cyber Incident Management: Detection and response to active exploitation attempts 3.3.9 — Mobile Security: Securing MDM gateways handling financial institution mobile access
🟡 ISO 27001:2022
A.8.2 — Privileged Access Rights: Controlling administrative access to critical systems A.8.8 — Management of Technical Vulnerabilities: Timely application of security patches A.8.20 — Network Security: Restricting access to administrative interfaces A.8.22 — Segregation of Networks: Isolating management interfaces from production traffic A.5.15 — Access Control Policy: Enforcing authentication on all administrative interfaces A.8.7 — Protection Against Malware: Detecting exploitation attempts via monitoring
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities by installing applicable security patches Requirement 7.2 — Access to system components and cardholder data restricted to only those individuals whose job requires such access Requirement 10.2 — Audit logs capturing all access to system components Requirement 12.3.2 — Targeted risk analysis for critical vulnerability remediation timelines
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Ivanti:Sentry
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.44%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-09-12
Published 2023-08-22
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.4
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.