Vulnerabilities (CVE)

Filtered by vendor Mobileiron Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15505 1 Mobileiron 4 Core, Enterprise Connector, Monitor And Reporting Database and 1 more 2022-07-12 7.5 HIGH 9.8 CRITICAL
A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2020-35138 1 Mobileiron 1 Mobile\@work 2021-08-04 5.0 MEDIUM 9.8 CRITICAL
** DISPUTED ** The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in the com/mobileiron/common/utils/C4928m.java file. NOTE: It has been asserted that there is no causality or connection between credential encryption and the MiTM attack.
CVE-2020-15506 1 Mobileiron 5 Cloud, Core, Enterprise Connector and 2 more 2021-07-21 7.5 HIGH 9.8 CRITICAL
An authentication bypass vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0 that allows remote attackers to bypass authentication mechanisms via unspecified vectors.
CVE-2013-7287 1 Mobileiron 2 Sentry, Virtual Smartphone Platform 2020-02-21 10.0 HIGH 9.8 CRITICAL
MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme.
CVE-2014-1409 1 Mobileiron 2 Sentry, Virtual Smartphone Platform 2020-01-10 6.4 MEDIUM 9.1 CRITICAL
MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 have an authentication bypass vulnerability due to an XML file with obfuscated passwords