
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability (CVE-2023-38036) was identified in Ivanti Avalanche Manager versions prior to 6.4.1. The vulnerability allows an unauthenticated attacker to create a buffer overflow condition that could potentially lead to service disruption or arbitrary code execution (NVD).
The vulnerability is classified as a classic buffer overflow (CWE-120) with a CVSS v3.1 base score of 9.8 (CRITICAL). The attack vector is network-accessible (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U) with high impact on confidentiality (C:H), integrity (I:H), and availability (A:H) (NVD).
If successfully exploited, this vulnerability could result in service disruption or arbitrary code execution on affected systems. The high CVSS score indicates severe potential impacts on system confidentiality, integrity, and availability (NVD).
Organizations using affected versions of Ivanti Avalanche Manager should upgrade to version 6.4.1 or later to address this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."