Description
The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded encryption key, used to encrypt the submission of username/password details during the authentication process, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in the com/mobileiron/common/utils/C4928m.java file. NOTE: It has been asserted that there is no causality or connection between credential encryption and the MiTM attack
Published: 2021-03-29
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Mobileiron Mobile\@work
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T16:55:10.836Z

Reserved: 2020-12-11T00:00:00.000Z

Link: CVE-2020-35138

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-29T20:15:13.077

Modified: 2024-11-21T05:26:50.673

Link: CVE-2020-35138

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses