Ivanti is informing customers about 20 vulnerabilities patched in its Avalanche enterprise mobile device management (MDM) product, including over a dozen flaws that have a ‘critical’ severity rating.
Avalanche is used by many organizations to manage their mobile devices, ensuring that they are secure, accessible and available. The product can be used to manage a wide range of devices, from warehouse scanners to tablets on the retail floor.
The recently released Avalanche 6.4.2 patches 20 vulnerabilities affecting all supported versions of the on-premises product — version 6.3.1 and above — as well as older releases.
“Upon learning of the vulnerabilities, we immediately mobilized resources to fix the problem and have fixes available now for all impacted versions,” Ivanti said in a blog post.
Thirteen buffer overflow bugs have been rated ‘critical’, with a CVSS score of 9.8. They can be exploited — in some cases by unauthenticated attackers — for remote code execution or denial-of-service (DoS) attacks by sending specially crafted packets to the mobile device server.
Eight vulnerabilities have been assigned a ‘high’ severity rating based on their CVSS score. They can be exploited for DoS attacks, server-side request forgery (SSRF), arbitrary file uploads that can lead to remote code execution, and authentication bypass.
One medium-severity flaw patched by Ivanti in its Avalanche product can be leveraged for information disclosure or SSRF attacks.
It’s important that customers install the patches as soon as possible because it’s not uncommon for threat actors to target Ivanti product vulnerabilities.
CISA’s known exploited vulnerabilities catalog currently includes a dozen Ivanti product flaws, including three that came to light this year. The most recent are CVE-2023-38035, CVE-2023-35078 and CVE-2023-35081.
CVE-2023-35078 came to light in July, but it had been exploited in attacks aimed at the Norwegian government since at least April.