CVE-2024-47010

7.3 HIGH

📋 TL;DR

CVE-2024-47010 is a path traversal vulnerability in Ivanti Avalanche that allows remote unauthenticated attackers to bypass authentication mechanisms. This affects all Ivanti Avalanche installations before version 6.4.5, potentially exposing sensitive systems to unauthorized access.

💻 Affected Systems

Products:
  • Ivanti Avalanche
Versions: All versions before 6.4.5
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain administrative access, exfiltrate sensitive data, deploy ransomware, or pivot to other network systems.

🟠

Likely Case

Unauthorized access to the Avalanche management interface leading to configuration changes, device management compromise, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring in place to detect exploitation attempts.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances extremely vulnerable to automated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to the Avalanche server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity, and unauthenticated access makes this attractive for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.5

Vendor Advisory: https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory

Restart Required: Yes

Instructions:

1. Download Ivanti Avalanche 6.4.5 from the Ivanti support portal. 2. Backup current configuration and database. 3. Run the installer to upgrade to version 6.4.5. 4. Restart the Avalanche service or server as required.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the Avalanche server to only trusted IP addresses or networks.

Use firewall rules to limit access to Avalanche ports (typically 1777, 1778, 1779)

Web Application Firewall

all

Deploy a WAF with path traversal protection rules to block exploitation attempts.

Configure WAF rules to detect and block ../ sequences and other path traversal patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Avalanche server from untrusted networks
  • Enable detailed logging and monitoring for authentication bypass attempts and unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Check the Avalanche version in the web interface or via the About dialog in the Avalanche console.

Check Version:

In Avalanche web interface: Navigate to Help > About or check the server properties in the console.

Verify Fix Applied:

Confirm version shows 6.4.5 or higher in the Avalanche interface and test authentication requirements for all access paths.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access without credentials
  • Unusual file path access patterns in web server logs
  • Access to administrative URLs from unauthenticated sources

Network Indicators:

  • HTTP requests containing ../ sequences or path traversal patterns to Avalanche endpoints
  • Unauthenticated access to protected endpoints

SIEM Query:

source="avalanche_logs" AND (uri="*../*" OR (status=200 AND auth="none"))

🔗 References

📤 Share & Export