The software may be vulnerable to both Un-Auth XML interaction and unauthenticated device enrollment.
Weakness
The product accepts XML from an untrusted source but does not validate the XML against the proper schema.
Affected Software
| Name | 
Vendor | 
Start Version | 
End Version | 
| Bigfix_mobile | 
Hcltech | 
1.0 (including) | 
2.1 (excluding) | 
| Modern_client_management | 
Hcltech | 
1.0 (including) | 
2.1 (excluding) | 
Potential Mitigations
- Always validate XML input against a known XML Schema or DTD.
 
- It is not possible for an XML parser to validate all aspects of a document’s content because a parser cannot understand the complete semantics of the data. However, a parser can do a complete and thorough job of checking the document’s structure and therefore guarantee to the code that processes the document that the content is well-formed.
 
References