Headline
CVE-2022-36983: ZDI-22-788
This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche 6.3.3.101. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetSettings class. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-15919.
May 26th, 2022
Ivanti Avalanche SetSettings Exposed Dangerous Function Authentication Bypass Vulnerability****ZDI-22-788
ZDI-CAN-15919
CVE ID
CVE-2022-36983
CVSS SCORE
7.5, (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
AFFECTED VENDORS
Ivanti
AFFECTED PRODUCTS
Avalanche
VULNERABILITY DETAILS
This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the SetSettings class. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system.
ADDITIONAL DETAILS
Ivanti has issued an update to correct this vulnerability. More details can be found at:
https://download.wavelink.com/Files/avalanche_v6.3.4_release_notes.txt
DISCLOSURE TIMELINE
- 2021-12-08 - Vulnerability reported to vendor
- 2022-05-26 - Coordinated public release of advisory
- 2022-07-27 - Advisory Updated
CREDIT
Piotr Bazydlo (@chudypb)
BACK TO ADVISORIES
Related news
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.
SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.