CVE-2024-27975

An Use-after-free vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*

History

06 May 2025, 14:30

Type Values Removed Values Added
First Time Ivanti
Ivanti avalanche
CPE cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*
References () https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US - () https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US - Vendor Advisory

21 Nov 2024, 09:05

Type Values Removed Values Added
References () https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US - () https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US -

03 Jul 2024, 01:51

Type Values Removed Values Added
CWE CWE-416

19 Apr 2024, 13:10

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de use-after-free en el componente WLAvalancheService de Ivanti Avalanche anterior a 6.4.3 permite a un atacante remoto autenticado ejecutar comandos arbitrarios como SYSTEM.

19 Apr 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-19 02:15

Updated : 2025-05-06 14:30


NVD link : CVE-2024-27975

Mitre link : CVE-2024-27975

CVE.ORG link : CVE-2024-27975


JSON object : View

Products Affected

ivanti

  • avalanche
CWE
CWE-416

Use After Free