CVE-2021-42124

8.8 HIGH

📋 TL;DR

This vulnerability allows an attacker with access to the Inforail Service in Ivanti Avalanche to perform session takeover, potentially gaining unauthorized access to the system. It affects Ivanti Avalanche versions before 6.3.3. Organizations using vulnerable versions are at risk of compromise.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: All versions before 6.3.3
Operating Systems: Windows Server (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the Inforail Service component of Avalanche.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to take over administrative sessions, access sensitive data, and potentially deploy ransomware or other malware across managed devices.

🟠

Likely Case

Unauthorized access to the Avalanche management console, allowing configuration changes, data exfiltration, or deployment of malicious payloads to managed endpoints.

🟢

If Mitigated

Limited impact due to network segmentation and strong authentication controls preventing access to the Inforail Service.

🌐 Internet-Facing: HIGH if Inforail Service is exposed to the internet, as attackers could remotely exploit the vulnerability.
🏢 Internal Only: MEDIUM if service is only accessible internally, requiring attacker to already have network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Inforail Service but appears to be straightforward once that access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.3

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Alert-CVE-s-Addressed-in-Avalanche-6-3-3

Restart Required: Yes

Instructions:

1. Download Avalanche 6.3.3 from Ivanti support portal. 2. Backup current configuration and database. 3. Run the installer to upgrade to version 6.3.3. 4. Restart the Avalanche server and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the Inforail Service using firewall rules to only allow connections from trusted sources.

Access Control Lists

all

Implement strict network ACLs to limit which IP addresses can communicate with the Avalanche server on Inforail Service ports.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Avalanche server from untrusted networks
  • Monitor for unusual authentication patterns or session activity in Avalanche logs

🔍 How to Verify

Check if Vulnerable:

Check the Avalanche version in the web interface under Help > About, or check the installed version in Windows Programs and Features.

Check Version:

Not applicable - check via web interface or Windows control panel

Verify Fix Applied:

Verify version shows 6.3.3 or later in the Avalanche web interface or installed programs list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual session creation patterns
  • Multiple failed authentication attempts followed by successful login from same source
  • Administrative actions from unexpected IP addresses

Network Indicators:

  • Unusual traffic patterns to Inforail Service ports (typically TCP 1777)
  • Connection attempts from unauthorized IP ranges

SIEM Query:

source="avalanche_logs" AND (event_type="session_takeover" OR (auth_failure AND auth_success) FROM same_ip WITHIN 5m)

🔗 References

📤 Share & Export