First published: Wed Aug 14 2024(Updated: )
Improper input validation in the Central Filestore in Ivanti Avalanche 6.3.1 allows a remote authenticated attacker with admin rights to achieve RCE.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Avalanche | =6.3.1 | |
Ivanti Avalanche | =6.3.1.1507 | |
Ivanti Avalanche | =6.3.2 | |
Ivanti Avalanche | =6.3.2 | |
Ivanti Avalanche | =6.3.2 | |
Ivanti Avalanche | =6.3.2.3490 | |
Ivanti Avalanche | =6.3.2.3490 | |
Ivanti Avalanche | =6.3.3 | |
Ivanti Avalanche | =6.3.3 | |
Ivanti Avalanche | =6.3.3.101 | |
Ivanti Avalanche | =6.3.3.101 | |
Ivanti Avalanche | =6.3.4 | |
Ivanti Avalanche | =6.3.4 | |
Ivanti Avalanche | =6.3.4.153 | |
Ivanti Avalanche | =6.4.0 | |
Ivanti Avalanche | =6.4.1 | |
Ivanti Avalanche | =6.4.1 | |
Ivanti Avalanche | =6.4.1.207 | |
Ivanti Avalanche | =6.4.1.236 | |
Ivanti Avalanche | =6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37373 is considered a critical vulnerability due to its potential for remote code execution by authenticated attackers.
To resolve CVE-2024-37373, it is recommended to apply the latest security updates provided by Ivanti for the affected versions of Avalanche.
CVE-2024-37373 affects Ivanti Avalanche versions 6.3.1, 6.3.2, 6.3.3, 6.3.4, and 6.4.x.
The impact of CVE-2024-37373 allows remote authenticated attackers to execute arbitrary code on the affected system.
Organizations using Ivanti Avalanche versions listed in the vulnerability can be at risk if remote authenticated attackers gain access.