CVE-2024-23528
📋 TL;DR
An out-of-bounds read vulnerability in Ivanti Avalanche's WLAvalancheService component allows unauthenticated remote attackers to read sensitive information from memory. This affects Ivanti Avalanche versions before 6.4.3, potentially exposing credentials, configuration data, or other sensitive information stored in memory.
💻 Affected Systems
- Ivanti Avalanche
📦 What is this software?
Avalanche by Ivanti
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive information like administrative credentials, encryption keys, or other secrets from memory, leading to full system compromise.
Likely Case
Information disclosure of configuration data, session tokens, or other sensitive information that could facilitate further attacks.
If Mitigated
Limited information exposure with proper network segmentation and access controls in place.
🎯 Exploit Status
Exploitation requires specific conditions but is unauthenticated, making it accessible to remote attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.3
Vendor Advisory: https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US
Restart Required: Yes
Instructions:
1. Download Ivanti Avalanche 6.4.3 from the Ivanti support portal. 2. Backup current configuration and data. 3. Run the installer and follow upgrade prompts. 4. Restart the Avalanche server and verify service functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to the Avalanche server to trusted IP addresses only.
Use firewall rules to block external access to port 1777/TCP (default Avalanche port)
Service Disablement
windowsTemporarily disable the WLAvalancheService if not required for operations.
sc stop WLAvalancheService
sc config WLAvalancheService start= disabled
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure to trusted networks only.
- Monitor for unusual outbound connections or memory access patterns from the Avalanche server.
🔍 How to Verify
Check if Vulnerable:
Check the Avalanche version in the web interface under Help > About, or run 'wmic product get name,version' and look for Ivanti Avalanche versions below 6.4.3.
Check Version:
wmic product where name="Ivanti Avalanche" get version
Verify Fix Applied:
Verify the version shows 6.4.3 or higher in the Avalanche web interface or via the Windows command 'wmic product where name="Ivanti Avalanche" get version'.
📡 Detection & Monitoring
Log Indicators:
- Unusual memory access patterns in Windows Event Logs
- Failed authentication attempts followed by service crashes
Network Indicators:
- Unusual traffic to port 1777/TCP from untrusted sources
- Multiple connection attempts to WLAvalancheService
SIEM Query:
source="windows" AND (event_id=4625 OR event_id=1000) AND process_name="WLAvalancheService.exe"