First published: Wed Mar 29 2023(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ProfileDaoImpl class. A crafted request can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15329.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Avalanche | >=6.3.2.3490<6.3.4 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-36973.
The severity of CVE-2022-36973 is critical with a CVSS score of 9.1.
The affected software is Ivanti Avalanche version 6.3.2.3490 up to but not including version 6.3.4.
CVE-2022-36973 allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.2.3490.
Yes, although authentication is required to exploit CVE-2022-36973, the existing authentication mechanism can be bypassed.