09-14-2021 06:47 AM - edited 09-14-2021 10:19 AM
Hi Jamf Nation,
Today we're releasing a hotfix for Jamf Pro that addresses a recently responsibly disclosed security issue.
We strongly recommended that you upgrade to Jamf Pro 10.32.1 as soon as possible. The following CVE is addressed by this release:
[PI-010111]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40808
This is a placeholder CVE that will be updated once we can disclose more information. We have scored this at a 7.5 High security severity using CVSSv3.1 and recommend this update to all customers as this impacts all supported versions of Jamf Pro.
Please read the resolved issues section of the release notes for more information. Additional details on the resolved vulnerability will be made available at a future date to allow for Jamf Pro instances to be patched before full disclosure.
Please note this does not affect the cloud upgrade schedule for this upcoming weekend. You can find the cloud upgrade schedule here.
Read the full release notes here.
Posted on 09-14-2021 07:16 AM
What versions are affected prior to 10.32.1?? I have two installations. One running 10.32.0 and one running 10.30.3. I do not see "Affected Versions" listed anywhere.
Posted on 09-14-2021 07:25 AM
+1
Posted on 09-14-2021 07:33 AM
@BookstoreITAgreed. Currently running 10.31.1 here and since it's startup time, I'd like to know how urgent this is for the version we are running.
Posted on 09-14-2021 07:32 AM
I recall this happened last urgent security patch, didn't give the affected versions right away and we had to ask for it.
Posted on 09-14-2021 07:43 AM
Samy boat as everyone else here. We are still running 10.26 and there is no word of what versions are effected. We plan on upgrading next month but it would be nice to know how urgent the upgrade is.
Posted on 09-14-2021 07:47 AM
We recommend this upgrade for all users as this issue impacts all supported versions of Jamf Pro.
Posted on 09-14-2021 08:16 AM
This is helpful but should have been in the disclosure. Thank you.
Posted on 09-14-2021 07:47 AM
Im waiting on a chat to ask and I'll post replies
Posted on 09-14-2021 07:55 AM
There is no information in that CVE. What is the vulnerability - nothing is shown.
Posted on 09-14-2021 08:00 AM
We intentionally do not populate the CVE with the information initially as that would disclose the issue which would put people not patched at risk.
Once customers have ample amount of time to upgrade to the patched version we will update the CVE entry with more information. This time period varies depending on customer adoption.
At this point all we can disclose here is its a security issue that we have ranked at a 7.5 High severity and that it impacts all supported versions of Jamf Pro. There are a few more details that will be shared via email from Customer Success but the crux of the info is that it's a high security severity that is only fixable via upgrading Jamf Pro.
Posted on 09-14-2021 08:41 AM
@mike_paul , thank you for the reply. I understand the security concern, however I also agree with the folks below that customers should have some awareness of what result of an exploit would be at the very least.
Posted on 09-14-2021 09:04 AM
If the cloud based version of Jamf Pro isn't being updated until this weekend, why should we as on-prem support upgrade ahead of you guys?
Posted on 09-14-2021 09:27 AM
@BadinChuck, Jamf Cloud mass upgrades are scheduled in advance so customers know when services may be unavailable. If a cloud customer wishes to upgrade sooner they just need to reach out to Customer Success. Since we have no control over when customers who host their own instances update we provide the installer immediately and just ask that they do it at their earliest convenience to best protect themselves from risks.
Posted on 09-14-2021 07:58 AM
Agreed @ncats_lab customers knowing the vulnerability is key. Maybe not publicly disclosing the vuln. is a security measure, but we should be made aware of it.
Posted on 09-14-2021 08:01 AM
From JAMF:
I am guessing this has to do with complexity of the issue, or not wishing to alarm the general public, but that is just a guess on my part. We were not told the details of the specific vulnerability either but just simply that upgrade is recommended wherever/whenever possible
Posted on 09-14-2021 08:01 AM
Agreed, we as customers should be informed what is addressed, what versions have the issue, which server OS is effected (i.e. Mac Server, Windows etc.)
Posted on 09-14-2021 08:18 AM
How do you download the releases now in the new Jamf Nation interface?
Posted on 09-14-2021 08:23 AM
You have to go to account.jamf.com
Posted on 09-14-2021 08:30 AM
So, it's not just linked from my profile anymore, but I have to go there?
Posted on 09-14-2021 08:32 AM
As far as I know it is not. I could be wrong. The only way I've been able to get to it since they updated the forums was that page.
Posted on 09-14-2021 08:33 AM
Ok. That stinks they removed that link, but thank you for the information!
Posted on 09-14-2021 08:33 AM
Yes everything was moved there to here
Posted on 09-14-2021 09:35 AM
Are we waiting for the update cycle to get out cloud instances upgraded? Or will the hotfix be pushed out today?
I reached out to success@ early in the day and still have no response.
Posted on 09-14-2021 09:41 AM
@joseph_thompson All standard hosting Jamf Cloud will be updated to 10.32.1 this weekend unless it's otherwise requested by the customer. If you put in a request this morning you should expect a response soon and they will be able to upgrade you ahead of schedule if that is your request.
Posted on 09-15-2021 10:40 PM
Is this related to the forcedentry vulnerability?
Posted on 09-16-2021 12:19 PM
@inflicted, No, the hot fix above is to resolve the Jamf product issue PI-010111.
The forcedentry vulnerability is related to Apple OS functionality. More information on their recent updates can be found at Apple: https://support.apple.com/en-ca/HT212807 & https://support.apple.com/en-us/HT212804
It is recommended that people update to versions recommended by vendors to resolve the issues.
09-29-2021 02:48 AM - edited 09-29-2021 08:52 PM
It looks like this release, according to the release notes, patches 3 serious IndigoCard security vulnerabilities. Why is that not addressed up-front either in this post or why was no notice sent out about the vulnerabilities like the notice that was sent for the 10.30.1 release?
Posted on 09-29-2021 06:47 AM
As much as I don't like it (I agree with you @Claude7004 that it should be addressed up front), I can at least explain their logic.
When they discover a severe vulnerability, they put out a patch and hide the details hoping they can get the community (i.e. not JamfCloud) upgraded to a point where, when the details are released, the possibility of compromise is reduced or not existent.
Again, it sucks b/c you don't know the details of what this affects, especially if you have to run the update through a change management process.
Posted on 09-29-2021 06:49 AM
@Claude7004 There was one vulnerability that was addressed in this 10.32.1 release and three addressed in the 10.32 release to which we posted updates here in Jamf Nation and also sent communication via email. If you did not receive an email communication, please contact customers success at success@jamf.com.