CVE-2024-24998

8.8 HIGH

📋 TL;DR

This path traversal vulnerability in Ivanti Avalanche allows authenticated remote attackers to execute arbitrary commands with SYSTEM privileges. It affects Ivanti Avalanche versions before 6.4.3. Attackers can leverage this to gain complete control over affected systems.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: All versions before 6.4.3
Operating Systems: Windows (since SYSTEM privilege implies Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web component. Default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to data exfiltration, credential harvesting, and installation of malware or persistence mechanisms.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH if Avalanche web interface is exposed to internet, as authenticated attackers can achieve full system compromise.
🏢 Internal Only: HIGH as authenticated internal users or compromised accounts can exploit this for privilege escalation and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but path traversal to RCE is typically straightforward once discovered. Weaponization likely given high impact and CVSS score.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.3

Vendor Advisory: https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US

Restart Required: Yes

Instructions:

1. Download Ivanti Avalanche 6.4.3 from official sources. 2. Backup current configuration and data. 3. Install the update following Ivanti's upgrade documentation. 4. Restart the Avalanche server and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Avalanche web interface to trusted networks only

Authentication Hardening

all

Implement strong authentication controls and monitor for suspicious login attempts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Avalanche web interface
  • Enable detailed logging and monitoring for path traversal attempts and unusual command execution

🔍 How to Verify

Check if Vulnerable:

Check Avalanche version via web interface admin panel or installed program version

Check Version:

Check via Avalanche web interface: Admin > About, or on Windows: Check installed programs list for Ivanti Avalanche version

Verify Fix Applied:

Verify version is 6.4.3 or later in admin panel and test path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path access patterns in web logs
  • Unexpected command execution events
  • Authentication from unusual sources

Network Indicators:

  • HTTP requests with directory traversal sequences (../, ..\) to Avalanche endpoints
  • Outbound connections from Avalanche server to unexpected destinations

SIEM Query:

source="avalanche_logs" AND (uri="*../*" OR uri="*..\\*" OR event="command_execution")

🔗 References

📤 Share & Export