CVE-2022-36972

9.8 CRITICAL

📋 TL;DR

CVE-2022-36972 is a critical SQL injection vulnerability in Ivanti Avalanche that allows remote attackers to bypass authentication. The flaw exists in the ProfileDaoImpl class where user-supplied input is improperly incorporated into SQL queries. Organizations running affected versions of Ivanti Avalanche are vulnerable to complete system compromise.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: 6.3.2.3490 and earlier
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability is in the core application code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attackers gain administrative access to the Avalanche system, potentially leading to full network compromise, data exfiltration, and ransomware deployment.

🟠

Likely Case

Attackers bypass authentication to gain administrative privileges, allowing them to modify configurations, deploy malicious payloads, and access sensitive device management data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Avalanche system itself, preventing lateral movement to other critical assets.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending a crafted HTTP request to the vulnerable endpoint. No authentication is required, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.4 or later

Vendor Advisory: https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt

Restart Required: Yes

Instructions:

1. Download Ivanti Avalanche 6.3.4 or later from the Ivanti support portal. 2. Backup current configuration and database. 3. Run the installer to upgrade. 4. Restart the Avalanche service. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Avalanche server to only trusted management networks

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules in front of the Avalanche server

🧯 If You Can't Patch

  • Immediately isolate the Avalanche server from the internet and restrict internal access to only necessary administrators
  • Implement strict network monitoring and alerting for suspicious authentication attempts and SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check the Avalanche version in the web interface under Help > About. If version is 6.3.2.3490 or earlier, the system is vulnerable.

Check Version:

Not applicable - check via web interface at https://[avalanche-server]/avalanche/

Verify Fix Applied:

After patching, verify the version shows 6.3.4 or later in the web interface. Test authentication functionality to ensure it's working properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts from unexpected IPs
  • SQL error messages in application logs
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • HTTP requests containing SQL injection patterns to /avalanche/ endpoints
  • Unusual outbound connections from the Avalanche server

SIEM Query:

source="avalanche" AND (event_type="authentication" AND result="success" AND user="admin" AND src_ip NOT IN [trusted_ips]) OR (message="*SQL*" OR message="*syntax*" OR message="*query*")

🔗 References

📤 Share & Export