Plattform
ivanti
Komponente
ivanti-avalanche
Behoben in
6.4.5
CVE-2024-47010 describes a Path Traversal vulnerability discovered in Ivanti Avalanche prior to version 6.4.5. This flaw allows a remote, unauthenticated attacker to bypass authentication controls, leading to potential unauthorized access. The vulnerability impacts versions of Ivanti Avalanche up to and including 6.4.5. A patch is available, requiring users to upgrade to version 6.4.5.
The impact of this Path Traversal vulnerability is significant due to its ease of exploitation and the potential for widespread data exposure. An attacker can leverage this flaw to bypass authentication and gain access to sensitive files and directories on the Ivanti Avalanche server. This could include configuration files, user credentials, and potentially even application code. Successful exploitation could lead to complete compromise of the system and data exfiltration. The lack of authentication required for exploitation further amplifies the risk, as any external user can attempt to exploit the vulnerability.
CVE-2024-47010 was publicly disclosed on October 8, 2024. As of this writing, there are no publicly available proof-of-concept exploits. The vulnerability's ease of exploitation and the widespread use of Ivanti Avalanche suggest a potential for active exploitation campaigns. Monitor security advisories and threat intelligence feeds for updates.
Organizations deploying Ivanti Avalanche, particularly those with publicly accessible instances or those lacking robust network segmentation, are at significant risk. Environments with legacy configurations or those relying on default settings are also more vulnerable. Shared hosting environments where multiple customers share the same server infrastructure are especially susceptible.
• windows / supply-chain:
Get-Process -Name "Avalanche*" | Select-Object -ExpandProperty Path• linux / server:
ps aux | grep Avalanche• generic web:
curl -I http://your-avalanche-server/../../../../etc/passwddisclosure
Exploit-Status
EPSS
1.34% (80% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-47010 is to immediately upgrade Ivanti Avalanche to version 6.4.5 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting network access to the Ivanti Avalanche server and implementing strict file access controls. Review and harden existing authentication mechanisms. Monitor system logs for suspicious activity, particularly attempts to access unusual file paths. After upgrading, confirm the vulnerability is resolved by attempting to access a restricted file via a web browser; access should be denied.
Actualice Ivanti Avalanche a la versión 6.4.5 o posterior. La actualización corrige la vulnerabilidad de path traversal que permite la elusión de la autenticación. Consulte el aviso de seguridad de Ivanti para obtener instrucciones detalladas sobre la actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-47010 is a Path Traversal vulnerability affecting Ivanti Avalanche versions up to 6.4.5, allowing attackers to bypass authentication and access sensitive files.
You are affected if you are using Ivanti Avalanche version 6.4.5 or earlier. Check your version and upgrade immediately.
Upgrade Ivanti Avalanche to version 6.4.5 or later to resolve the vulnerability. Consider temporary WAF rules as an interim measure.
As of October 2024, there is no confirmed active exploitation of CVE-2024-47010 in the wild, but the ease of exploitation warrants caution.
Refer to the official Ivanti Security Advisory for detailed information and remediation steps: [https://www.ivanti.com/support/kb/security-advisories/](https://www.ivanti.com/support/kb/security-advisories/)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.