First published: Wed Aug 14 2024(Updated: )
An off-by-one error in WLInfoRailService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Avalanche | =6.3.1 | |
Ivanti Avalanche | =6.3.1.1507 | |
Ivanti Avalanche | =6.3.2 | |
Ivanti Avalanche | =6.3.2 | |
Ivanti Avalanche | =6.3.2 | |
Ivanti Avalanche | =6.3.2.3490 | |
Ivanti Avalanche | =6.3.2.3490 | |
Ivanti Avalanche | =6.3.3 | |
Ivanti Avalanche | =6.3.3 | |
Ivanti Avalanche | =6.3.3.101 | |
Ivanti Avalanche | =6.3.3.101 | |
Ivanti Avalanche | =6.3.4 | |
Ivanti Avalanche | =6.3.4 | |
Ivanti Avalanche | =6.3.4.153 | |
Ivanti Avalanche | =6.4.0 | |
Ivanti Avalanche | =6.4.1 | |
Ivanti Avalanche | =6.4.1 | |
Ivanti Avalanche | =6.4.1.207 | |
Ivanti Avalanche | =6.4.1.236 | |
Ivanti Avalanche | =6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36136 is a denial-of-service vulnerability that allows a remote unauthenticated attacker to crash the WLInfoRailService.
To fix CVE-2024-36136, you should update Ivanti Avalanche to a patched version provided by the vendor.
CVE-2024-36136 affects Ivanti Avalanche versions 6.3.1 through 6.4.2.
Yes, CVE-2024-36136 can be exploited remotely without authentication.
The impact of CVE-2024-36136 is that it can lead to service disruptions, resulting in a denial of service.