First published: Wed Mar 29 2023(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the EnterpriseServer service. The issue results from the lack of proper locking when performing operations during authentication. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15528.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Avalanche | >=6.3.2.3490<6.3.4 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36980 refers to a vulnerability in Ivanti Avalanche EnterpriseServer that allows remote attackers to bypass authentication.
CVE-2022-36980 has a severity rating of 9.4, which is considered critical.
CVE-2022-36980 affects versions of Ivanti Avalanche up to and including 6.3.4.
Remote attackers can exploit CVE-2022-36980 by bypassing the existing authentication mechanism in Ivanti Avalanche EnterpriseServer.
Yes, you can find more information about CVE-2022-36980 at the following references: [Reference 1](https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt), [Reference 2](https://www.zerodayinitiative.com/advisories/ZDI-22-785/).