Impact
The vulnerability is an authentication bypass caused by a primary weakness in Jamf Pro, allowing attackers to access the system without valid credentials. This broken access control can enable unauthorized users to view or modify data, run privileged commands, or otherwise compromise the affected Jamf environment. The description indicates unspecified impact, which could encompass a range of confidentiality, integrity, or availability concerns depending on the attacker’s intent and system configuration.
Affected Systems
Jamf Pro versions from 11.20 through 11.24 are affected. An impact on any environment using these versions must be evaluated to determine the scope of exposed resources and whether the authentication bypass could affect critical management tasks.
Risk and Exploitability
The CVSS score of 5.3 denotes moderate severity, while the EPSS score of less than 1% indicates a low probability of exploitation at the time of this analysis. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed public exploits yet. The likely attack vector is remote, potentially through the web‑based administrative interface or API, though the exact method is not detailed in the source material. The authentication bypass nature means an attacker could obtain unauthorized access without initial credentials, and once inside, could conduct further malicious activities depending on the role permissions granted after bypass.
OpenCVE Enrichment