CVE-2023-41474
Ivanti Avalanche vulnerability analysis and mitigation

Overview

A directory traversal vulnerability (CVE-2023-41474) was discovered in Ivanti Avalanche version 6.3.4.153. The vulnerability allows a remote authenticated attacker to obtain sensitive information through the javax.faces.resource component. The issue was disclosed on January 25, 2024, affecting Ivanti Avalanche's on-premise installations (NVD, MITRE CVE).

Technical details

The vulnerability is a path traversal issue that enables access to files under the C:\PROGRAM DATA\Wavelink\AVALANCHE\Web\webapps\AvalancheWeb directory. The exploitation can be performed using the URL pattern: /AvalancheWeb//faces/javax.faces.resource/?loc=. Only specific file extensions like .xml and .html are accessible, depending on .htaccess rules. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium), with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N (NVD, Security Online).

Impact

The vulnerability can lead to unauthorized access to configuration settings and internal information. In more severe scenarios, attackers could potentially access memory dump files (dump.hprof) that may contain sensitive information such as login credentials, which could be used for session hijacking and complete server compromise. This information could enable privilege escalation or lateral movement within the environment (Security Online).

Mitigation and workarounds

Organizations running Ivanti Avalanche version 6.3.4.153 should apply any available security updates from the vendor. Additionally, organizations should monitor for unauthorized access attempts and ensure proper access controls are in place for sensitive system files (NVD).

Additional resources


SourceThis report was generated using AI

Related Ivanti Avalanche vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-38036CRITICAL9.8
  • Ivanti AvalancheIvanti Avalanche
  • cpe:2.3:a:ivanti:avalanche
NoYesJul 12, 2025
CVE-2024-13181CRITICAL9.8
  • Ivanti AvalancheIvanti Avalanche
  • cpe:2.3:a:ivanti:avalanche
NoYesJan 14, 2025
CVE-2024-13180HIGH7.5
  • Ivanti AvalancheIvanti Avalanche
  • cpe:2.3:a:ivanti:avalanche
NoYesJan 14, 2025
CVE-2025-8297HIGH7.2
  • Ivanti AvalancheIvanti Avalanche
  • cpe:2.3:a:ivanti:avalanche
NoYesAug 12, 2025
CVE-2025-8296HIGH7.2
  • Ivanti AvalancheIvanti Avalanche
  • cpe:2.3:a:ivanti:avalanche
NoYesAug 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management