CVE-2023-28126

An authentication bypass vulnerability exists in Avalanche versions 6.3.x and below that could allow an attacker to gain access by exploiting the SetUser method or can exploit the Race Condition in the authentication message.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*

History

16 May 2023, 18:24

Type Values Removed Values Added
CPE cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
References (MISC) https://forums.ivanti.com/s/article/ZDI-CAN-17750-Ivanti-Avalanche-EnterpriseServer-GetSettings-Exposed-Dangerous-Method-Authentication-Bypass-Vulnerability?language=en_US - (MISC) https://forums.ivanti.com/s/article/ZDI-CAN-17750-Ivanti-Avalanche-EnterpriseServer-GetSettings-Exposed-Dangerous-Method-Authentication-Bypass-Vulnerability?language=en_US - Vendor Advisory
CWE CWE-362

09 May 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-09 22:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-28126

Mitre link : CVE-2023-28126

CVE.ORG link : CVE-2023-28126


JSON object : View

Products Affected

ivanti

  • avalanche
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-305

Authentication Bypass by Primary Weakness