An Use-after-free vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
References
Configurations
History
06 May 2025, 14:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ivanti
Ivanti avalanche |
|
CPE | cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* | |
References | () https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US - Vendor Advisory |
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://forums.ivanti.com/s/article/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US - |
03 Jul 2024, 01:51
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 |
19 Apr 2024, 13:10
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Apr 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-19 02:15
Updated : 2025-05-06 14:30
NVD link : CVE-2024-27975
Mitre link : CVE-2024-27975
CVE.ORG link : CVE-2024-27975
JSON object : View
Products Affected
ivanti
- avalanche
CWE
CWE-416
Use After Free