Vulnerability Description
An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution. Thanks to a Researcher at Tenable for finding and reporting. Fixed in version 6.4.1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ivanti | Avalanche | < 6.4.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Executio
- http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow
- https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1Vendor Advisory
- http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Executio
- http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow
- https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1Vendor Advisory
FAQ
What is CVE-2023-32560?
CVE-2023-32560 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution. Thanks to a Researcher at Tenable for finding...
How severe is CVE-2023-32560?
CVE-2023-32560 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-32560?
Check the references section above for vendor advisories and patch information. Affected products include: Ivanti Avalanche.