CVE-2024-37399

7.5 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to cause a denial of service (DoS) by crashing the WLAvalancheService in Ivanti Avalanche. The NULL pointer dereference can be triggered without authentication, making affected systems unavailable. Organizations running Ivanti Avalanche 6.3.1 are impacted.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: 6.3.1
Operating Systems: Windows Server (where Avalanche is typically deployed)
Default Config Vulnerable: ⚠️ Yes
Notes: The WLAvalancheService runs by default on affected installations. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Ivanti Avalanche management system, disrupting mobile device management operations and potentially affecting all managed endpoints.

🟠

Likely Case

Service crashes requiring manual restart, causing temporary disruption to mobile device management capabilities.

🟢

If Mitigated

Minimal impact if service is behind proper network segmentation and has automated restart capabilities.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still trigger the DoS, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

NULL pointer dereference vulnerabilities are often straightforward to exploit for DoS. The unauthenticated nature lowers the barrier for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.4 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-6-4-4-CVE-2024-38652-CVE-2024-38653-CVE-2024-36136-CVE-2024-37399-CVE-2024-37373

Restart Required: Yes

Instructions:

1. Download Ivanti Avalanche 6.4.4 or later from the Ivanti support portal. 2. Backup current configuration and database. 3. Run the installer with administrative privileges. 4. Restart the Avalanche service after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Avalanche server to only trusted management networks.

Configure firewall rules to allow only specific IP ranges to access TCP ports used by Avalanche (default includes 1771, 1772, 1773)

Service Monitoring and Auto-restart

windows

Implement monitoring and automatic restart of the WLAvalancheService to reduce downtime.

sc.exe failure WLAvalancheService reset= 86400 actions= restart/5000
Set up Windows Task Scheduler or monitoring tool to restart service if it stops

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted sources only.
  • Deploy intrusion detection systems to monitor for exploitation attempts and alert on service crashes.

🔍 How to Verify

Check if Vulnerable:

Check the Avalanche version in the web interface (Admin > About) or examine installed programs in Windows Control Panel.

Check Version:

wmic product where "name like 'Ivanti Avalanche%'" get version

Verify Fix Applied:

Verify version is 6.4.4 or later and test service stability with normal operations.

📡 Detection & Monitoring

Log Indicators:

  • Windows Application Event Log entries showing WLAvalancheService crashes (Event ID 1000)
  • Sudden service termination without normal shutdown in system logs

Network Indicators:

  • Unusual traffic patterns to Avalanche service ports from untrusted sources
  • Multiple connection attempts followed by service unavailability

SIEM Query:

source="windows" AND (event_id=1000 AND process_name="WLAvalancheService.exe") OR (service_name="WLAvalancheService" AND state="stopped")

🔗 References

📤 Share & Export