--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Multiple Vulnerabilities in Ivanti Avalanche MDM' number: '2024-041' version: '1.0' original_date: 'April 16, 2024' date: 'April 17, 2024' --- _History:_ * _17/04/2024 --- v1.0 -- Initial publication_ # Summary On April 16, 2024, Ivanti disclosed several vulnerabilities in its Avalanche MDM solution, including two critical heap overflow issues allowing unauthenticated remote command execution [1]. It is recommended updating as soon as possible. # Technical Details The two critical security flaws, tracked as **CVE-2024-24996** and **CVE-2024-29204**, with CVSS score of 9.8, were found in Avalanche's `WLInfoRailService` and `WLAvalancheService` components [1]. They are both caused by heap-based buffer overflow weaknesses, which can let unauthenticated remote attackers execute arbitrary commands on vulnerable systems in low-complexity attacks that do not require user interaction [1]. The 25 other vulnerabilities are ranging from medium to high severity, and can lead to denial of service conditions, unauthorised command execution as `SYSTEM`, and sensitive information disclosure [2]. # Affected Products Avalanche MDM versions before version 6.4.3. # Recommendations CERT-EU recommends updating to the fixed version as soon as possible [2]. # References [1] [2]