CVE-2024-22061

9.8 CRITICAL

📋 TL;DR

A heap overflow vulnerability in the WLInfoRailService component of Ivanti Avalanche allows remote unauthenticated attackers to execute arbitrary commands on affected systems. This affects Ivanti Avalanche versions before 6.4.3, enabling complete system compromise. The vulnerability is rated CVSS 9.8 (Critical) due to its network accessibility and lack of authentication requirements.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: All versions before 6.4.3
Operating Systems: Windows Server (where Avalanche is deployed)
Default Config Vulnerable: ⚠️ Yes
Notes: The WLInfoRailService component is enabled by default in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, installation of persistent backdoors, lateral movement to other systems, and data exfiltration.

🟠

Likely Case

Remote code execution leading to ransomware deployment, credential theft, or system disruption.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and proper monitoring detects exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has a high CVSS score, making it attractive for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.3

Vendor Advisory: https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US

Restart Required: Yes

Instructions:

1. Download Ivanti Avalanche 6.4.3 from the Ivanti support portal. 2. Backup current configuration and data. 3. Run the installer and follow upgrade prompts. 4. Restart the Avalanche server after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Block external access to Avalanche servers using firewall rules to prevent remote exploitation.

Service Disablement

windows

Temporarily disable the WLInfoRailService component if not required for operations.

sc stop WLInfoRailService
sc config WLInfoRailService start= disabled

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to Avalanche servers only from trusted IP addresses.
  • Deploy intrusion detection systems (IDS) and monitor for unusual network traffic patterns targeting the WLInfoRailService port.

🔍 How to Verify

Check if Vulnerable:

Check the Avalanche version in the web interface under Help > About or examine the installed program version in Windows Programs and Features.

Check Version:

wmic product where name="Ivanti Avalanche" get version

Verify Fix Applied:

Confirm the version shows 6.4.3 or higher and verify the WLInfoRailService is running with updated binaries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from WLInfoRailService.exe
  • Access violations or heap corruption errors in Windows Event Logs

Network Indicators:

  • Unexpected network connections from Avalanche server to external IPs
  • Traffic spikes on the WLInfoRailService port

SIEM Query:

source="windows" AND (process_name="WLInfoRailService.exe" AND (event_id=4688 OR event_id=4625))

🔗 References

📤 Share & Export