CVE-2024-24997
Ivanti Avalanche vulnerability analysis and mitigation

Overview

A Path Traversal vulnerability (CVE-2024-24997) was discovered in the web component of Ivanti Avalanche before version 6.4.3. This vulnerability affects the WLAvalancheService, which listens on TCP port 1777 by default (ZDI Advisory).

Technical details

The vulnerability stems from the lack of proper validation of a user-supplied path prior to using it in file operations. It has been assigned a CVSS v3.0 base score of 8.8 (HIGH) with the vector string AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and requiring low privileges (ZDI Advisory).

Impact

Successful exploitation of this vulnerability allows an authenticated remote attacker to execute arbitrary commands in the context of SYSTEM, potentially leading to complete system compromise (ZDI Advisory, CIS Advisory).

Mitigation and workarounds

Ivanti has released version 6.4.3 to address this vulnerability. Organizations are strongly advised to upgrade to this latest version to mitigate the risk (SOCRadar).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management