CVE-2024-47008
📋 TL;DR
This Server-Side Request Forgery (SSRF) vulnerability in Ivanti Avalanche allows remote unauthenticated attackers to make the server send requests to internal systems, potentially exposing sensitive information. All organizations running vulnerable versions of Ivanti Avalanche are affected. The attacker does not need authentication to exploit this vulnerability.
💻 Affected Systems
- Ivanti Avalanche
📦 What is this software?
Avalanche by Ivanti
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains access to internal systems, sensitive data, or performs lateral movement within the network by exploiting the SSRF to interact with internal services.
Likely Case
Information disclosure of internal system details, configuration data, or credentials from internal services that the Avalanche server can reach.
If Mitigated
Limited impact with proper network segmentation and access controls preventing the Avalanche server from reaching sensitive internal systems.
🎯 Exploit Status
SSRF vulnerabilities typically have low exploitation complexity, especially when unauthenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.5
Vendor Advisory: https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory
Restart Required: Yes
Instructions:
1. Download Ivanti Avalanche version 6.4.5 from the official Ivanti portal. 2. Backup your current Avalanche configuration and database. 3. Run the installer to upgrade to version 6.4.5. 4. Restart the Avalanche service or server as required.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to the Avalanche server to prevent it from reaching sensitive internal systems.
Firewall Rules
allImplement firewall rules to block outbound connections from the Avalanche server to internal networks.
🧯 If You Can't Patch
- Isolate the Avalanche server in a DMZ or restricted network segment
- Implement strict outbound firewall rules to limit the server's network access
🔍 How to Verify
Check if Vulnerable:
Check the Avalanche version in the web interface or configuration files. If version is below 6.4.5, the system is vulnerable.
Check Version:
Check the Avalanche web interface under Help > About, or examine the installation directory for version files.
Verify Fix Applied:
Verify the Avalanche version shows 6.4.5 or higher after patching.
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from the Avalanche server
- Requests to internal IP addresses or services from the Avalanche server
Network Indicators:
- Unexpected HTTP traffic from Avalanche server to internal systems
- SSRF payload patterns in network traffic
SIEM Query:
source_ip="avalanche_server_ip" AND (dest_ip="internal_network_range" OR dest_port IN (80, 443, 8080, 8443))