CVE-2024-29848
📋 TL;DR
This vulnerability allows authenticated privileged users in Ivanti Avalanche to upload arbitrary files, leading to remote code execution with SYSTEM privileges. It affects Ivanti Avalanche web components before version 6.4.x. Attackers with valid credentials can achieve complete system compromise.
💻 Affected Systems
- Ivanti Avalanche
📦 What is this software?
Avalanche by Ivanti
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, allowing attackers to install persistent backdoors, steal sensitive data, pivot to other systems, and disrupt critical infrastructure.
Likely Case
Privilege escalation leading to lateral movement within the network, data exfiltration, and deployment of ransomware or other malware.
If Mitigated
Limited impact with proper network segmentation, strong authentication controls, and file upload restrictions in place.
🎯 Exploit Status
Exploitation requires authenticated privileged access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.3.602 or later
Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-May-2024
Restart Required: Yes
Instructions:
1. Download Ivanti Avalanche version 6.4.3.602 or later from official sources. 2. Backup current configuration and data. 3. Install the update following Ivanti's upgrade documentation. 4. Restart the Avalanche server and verify functionality.
🔧 Temporary Workarounds
Restrict File Upload Types
allConfigure web server to only allow specific file types and validate file extensions server-side.
Implement Web Application Firewall Rules
allDeploy WAF rules to block malicious file upload patterns and command execution attempts.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Avalanche servers from critical systems.
- Enforce multi-factor authentication and strong password policies for all privileged accounts.
🔍 How to Verify
Check if Vulnerable:
Check Ivanti Avalanche version in web interface or via system information. Versions below 6.4.x are vulnerable.
Check Version:
Check web interface or system properties for version information.
Verify Fix Applied:
Verify version is 6.4.3.602 or later and test file upload functionality with restricted file types.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to Avalanche web interface
- Suspicious process creation with SYSTEM privileges
- Failed authentication attempts followed by successful privileged access
Network Indicators:
- Unusual outbound connections from Avalanche server
- Traffic patterns indicating command and control activity
SIEM Query:
source="avalanche" AND (event="file_upload" OR event="privilege_escalation")
🔗 References
- https://forums.ivanti.com/s/article/Security-Advisory-May-2024
- https://forums.ivanti.com/s/article/Avalanche-6-4-3-602-additional-security-hardening-and-CVE-fixed?language=en_US
- https://forums.ivanti.com/s/article/Security-Advisory-May-2024
- https://forums.ivanti.com/s/article/Avalanche-6-4-3-602-additional-security-hardening-and-CVE-fixed?language=en_US