| Description |
This article describes the assessment of Ivanti Core remote unauthenticated API access vulnerability in Realtek SDK UDP server with FortiDAST. An authentication bypass vulnerability has been identified in Ivanti Endpoint Manager Mobile(EPMM) through 11.10, formerly MobileIron Core, which allows unauthorized users to access restricted functionality of the application or obtain PII without a proper authentication. |
| Scope |
FortiDAST Scripting Engine updated in version 23.3.a |
| Solution |
Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).
This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.
To configure the scan, it will be necessary to enable the FSE group signature ‘ivanti’ which will select the underlying script: ‘CVE-2023-35078 Ivanti IronCore API Access vulnerability.’
For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.