{"id":289993,"date":"2024-01-08T08:18:42","date_gmt":"2024-01-08T07:18:42","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=289993"},"modified":"2024-01-08T08:18:42","modified_gmt":"2024-01-08T07:18:42","slug":"ivanti-fixt-kritische-schwachstelle-cve-2023-39336-in-epm","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2024\/01\/08\/ivanti-fixt-kritische-schwachstelle-cve-2023-39336-in-epm\/","title":{"rendered":"Ivanti fixt kritische Schwachstelle CVE-2023-39336 in EPM"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\"\/>Anbieter Ivanti warnt vor einer Schwachstelle CVE-2023-39336 in seinem Endpoint Manager Mobile (EPM), die es nicht authentifizierten Angreifern erm\u00f6glicht, angemeldete Ger\u00e4te oder den Hauptserver zu \u00fcbernehmen. Die Sicherheitsl\u00fccke CVE-2023-39336 betrifft alle unterst\u00fctzten Ivanti EPM-Versionen und wurde&nbsp; in Version 2022 Service Update 5 behoben. Details lassen sich bei <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ivanti-warns-critical-epm-bug-lets-hackers-hijack-enrolled-devices\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a> nachlesen. Dieser Patch setzt die kritischen Updates aus 2023 fort (siehe <a href=\"https:\/\/borncity.com\/blog\/2023\/08\/25\/palo-alto-nachlese-der-schwachstellen-im-ivanti-endpoint-manager-mobile-august-2023\/\">Palo Alto: Nachlese der Schwachstellen im Ivanti Endpoint Manager Mobile (August 2023)<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anbieter Ivanti warnt vor einer Schwachstelle CVE-2023-39336 in seinem Endpoint Manager Mobile (EPM), die es nicht authentifizierten Angreifern erm\u00f6glicht, angemeldete Ger\u00e4te oder den Hauptserver zu \u00fcbernehmen. Die Sicherheitsl\u00fccke CVE-2023-39336 betrifft alle unterst\u00fctzten Ivanti EPM-Versionen und wurde&nbsp; in Version 2022 Service &hellip; <a href=\"https:\/\/borncity.com\/blog\/2024\/01\/08\/ivanti-fixt-kritische-schwachstelle-cve-2023-39336-in-epm\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-289993","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/289993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=289993"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/289993\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=289993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=289993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=289993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}