CVE-2020-35137

** DISPUTED ** The MobileIron agents through 2021-03-22 for Android and iOS contain a hardcoded API key, used to communicate with the MobileIron SaaS discovery API, as demonstrated by Mobile@Work (aka com.mobileiron). The key is in com/mobileiron/registration/RegisterActivity.java and can be used for api/v1/gateway/customers/servers requests. NOTE: Vendor states that this is an opt-in feature to the product - it is not enabled by default and customers cannot enable it without an explicit email to support. At this time, they do not plan change to make any changes to this feature.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mobileiron:mobile\@work:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:mobileiron:mobile\@work:*:*:*:*:*:android:*:*

Information

Published : 2021-03-29 13:15

Updated : 2023-03-03 06:00


NVD link : CVE-2020-35137

Mitre link : CVE-2020-35137


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

mobileiron

  • mobile\@work