The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded API key, used to communicate with the MobileIron SaaS discovery API, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in com/mobileiron/registration/RegisterActivity.java and can be used for api/v1/gateway/customers/servers requests. NOTE: Vendor states that this is an opt-in feature to the product - it is not enabled by default and customers cannot enable it without an explicit email to support. At this time, they do not plan change to make any changes to this feature.
References
Link | Resource |
---|---|
https://github.com/optiv/rustyIron | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.mobileiron&hl=en_US&gl=US | Product |
https://www.optiv.com/explore-optiv-insights/source-zero/mobileiron-mdm-contains-static-key-allowing-account-enumeration | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Nov 2023, 03:21
Type | Values Removed | Values Added |
---|---|---|
Summary | The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded API key, used to communicate with the MobileIron SaaS discovery API, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in com/mobileiron/registration/RegisterActivity.java and can be used for api/v1/gateway/customers/servers requests. NOTE: Vendor states that this is an opt-in feature to the product - it is not enabled by default and customers cannot enable it without an explicit email to support. At this time, they do not plan change to make any changes to this feature. |
Information
Published : 2021-03-29 20:15
Updated : 2024-08-04 17:15
NVD link : CVE-2020-35137
Mitre link : CVE-2020-35137
CVE.ORG link : CVE-2020-35137
JSON object : View
Products Affected
mobileiron
- mobile\@work
CWE
CWE-798
Use of Hard-coded Credentials