SB2023031013 - Improper Authentication in Ivanti Avalanche



SB2023031013 - Improper Authentication in Ivanti Avalanche

Published: March 10, 2023 Updated: May 16, 2023

Security Bulletin ID SB2023031013
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 60% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2022-44574)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests within the Remote Control Server RCServlet servlet. A remote attacker can bypass authentication process and gain unauthorized access to the application.


2) Improper Authentication (CVE-ID: CVE-2023-28125)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests within the InfoRail service. A remote user can bypass authentication process and gain unauthorized access to the application.


3) Improper Authentication (CVE-ID: CVE-2023-28126)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the exposure of a dangerous method or function to unprivileged users within the GetSettings class. A remote user can bypass authentication process and gain unauthorized access to the application.


4) Path traversal (CVE-ID: CVE-2023-28127)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within the getLogFile function. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.


5) Arbitrary file upload (CVE-ID: CVE-2023-28128)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload within the FileStoreConfig app. A remote administrator can upload a malicious file and execute it on the server.


Remediation

Install update from vendor's website.