An unauthenticated attacker could achieve the code execution through a RemoteControl server.
References
Configurations
History
21 Nov 2024, 08:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US - Vendor Advisory | |
| References | () https://twitter.com/wvuuuuuuuuuuuuu/status/1694956245742923939 - |
15 Aug 2023, 20:10
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 | |
| CPE | cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* | |
| References | (MISC) https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1?language=en_US - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
10 Aug 2023, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-08-10 20:15
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32563
Mitre link : CVE-2023-32563
CVE.ORG link : CVE-2023-32563
JSON object : View
Products Affected
ivanti
- avalanche
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
