U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2020-15505

Change History

Modified Analysis by NIST 2/03/2021 12:09:11 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:mobileiron:cloud:*:*:*:*:*:*:*:* versions up to (including) 10.6
     *cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* versions up to (including) 10.6
     *cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:* versions up to (including) 10.6
     *cpe:2.3:a:mobileiron:reporting_database:*:*:*:*:*:*:*:* versions up to (including) 10.6
     *cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:* versions up to (including) 9.8
OR
     *cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.0.4
     *cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* versions from (including) 10.4.0.0 up to (excluding) 10.4.0.4
     *cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* versions from (including) 10.5.1.0 up to (excluding) 10.5.1.1
     *cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* versions from (including) 10.5.2.0 up to (excluding) 10.5.2.1
     *cpe:2.3:a:mobileiron:core:*:*:*:*:*:*:*:* versions from (including) 10.6.0.0 up to (excluding) 10.6.0.1
     *cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:* versions up to (excluding) 10.3.0.4
     *cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:* versions from (including) 10.4.0.0 up to (excluding) 10.4.0.4
     *cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:* versions from (including) 10.5.1.0 up to (excluding) 10.5.1.1
     *cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:* versions from (including) 10.5.2.0 up to (excluding) 10.5.2.1
     *cpe:2.3:a:mobileiron:enterprise_connector:*:*:*:*:*:*:*:* versions from (including) 10.6.0.0 up to (excluding) 10.6.0.1
     *cpe:2.3:a:mobileiron:monitor_and_reporting_database:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.0.2
     *cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:* versions from (including) 9.7.0 up to (excluding) 9.7.3
     *cpe:2.3:a:mobileiron:sentry:*:*:*:*:*:*:*:* versions from (including) 9.8.0 up to (excluding) 9.8.1
Changed Reference Type
http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html No Types Assigned
http://packetstormsecurity.com/files/161097/MobileIron-MDM-Hessian-Based-Java-Deserialization-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/ No Types Assigned
https://perchsecurity.com/perch-news/cve-spotlight-mobileiron-rce-cve-2020-15505/ Exploit, Third Party Advisory