CVE-2024-23528

7.5 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Ivanti Avalanche's WLAvalancheService component allows unauthenticated remote attackers to read sensitive information from memory. This affects Ivanti Avalanche versions before 6.4.3, potentially exposing credentials, configuration data, or other sensitive information stored in memory.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: All versions before 6.4.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: WLAvalancheService component is typically enabled by default in Avalanche installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive information like administrative credentials, encryption keys, or other secrets from memory, leading to full system compromise.

🟠

Likely Case

Information disclosure of configuration data, session tokens, or other sensitive information that could facilitate further attacks.

🟢

If Mitigated

Limited information exposure with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires specific conditions but is unauthenticated, making it accessible to remote attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.3

Vendor Advisory: https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US

Restart Required: Yes

Instructions:

1. Download Ivanti Avalanche 6.4.3 from the Ivanti support portal. 2. Backup current configuration and data. 3. Run the installer and follow upgrade prompts. 4. Restart the Avalanche server and verify service functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Avalanche server to trusted IP addresses only.

Use firewall rules to block external access to port 1777/TCP (default Avalanche port)

Service Disablement

windows

Temporarily disable the WLAvalancheService if not required for operations.

sc stop WLAvalancheService
sc config WLAvalancheService start= disabled

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted networks only.
  • Monitor for unusual outbound connections or memory access patterns from the Avalanche server.

🔍 How to Verify

Check if Vulnerable:

Check the Avalanche version in the web interface under Help > About, or run 'wmic product get name,version' and look for Ivanti Avalanche versions below 6.4.3.

Check Version:

wmic product where name="Ivanti Avalanche" get version

Verify Fix Applied:

Verify the version shows 6.4.3 or higher in the Avalanche web interface or via the Windows command 'wmic product where name="Ivanti Avalanche" get version'.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory access patterns in Windows Event Logs
  • Failed authentication attempts followed by service crashes

Network Indicators:

  • Unusual traffic to port 1777/TCP from untrusted sources
  • Multiple connection attempts to WLAvalancheService

SIEM Query:

source="windows" AND (event_id=4625 OR event_id=1000) AND process_name="WLAvalancheService.exe"

🔗 References

📤 Share & Export