Ivanti is informing customers about 20 vulnerabilities patched in its Avalanche enterprise mobile device management product, including over a dozen flaws that have a 'critical' severity rating.
Avalanche is used by many organizations to manage their mobile devices, ensuring that they are secure, accessible and available.
The product can be used to manage a wide range of devices, from warehouse scanners to tablets on the retail floor.
The recently released Avalanche 6.4.2 patches 20 vulnerabilities affecting all supported versions of the on-premises product - version 6.3.1 and above - as well as older releases.
Thirteen buffer overflow bugs have been rated 'critical', with a CVSS score of 9.8.
They can be exploited - in some cases by unauthenticated attackers - for remote code execution or denial-of-service attacks by sending specially crafted packets to the mobile device server.
Eight vulnerabilities have been assigned a 'high' severity rating based on their CVSS score.
They can be exploited for DoS attacks, server-side request forgery, arbitrary file uploads that can lead to remote code execution, and authentication bypass.
One medium-severity flaw patched by Ivanti in its Avalanche product can be leveraged for information disclosure or SSRF attacks.
It's important that customers install the patches as soon as possible because it's not uncommon for threat actors to target Ivanti product vulnerabilities.
CISA's known exploited vulnerabilities catalog currently includes a dozen Ivanti product flaws, including three that came to light this year.
The most recent are CVE-2023-38035, CVE-2023-35078 and CVE-2023-35081.
CVE-2023-35078 came to light in July, but it had been exploited in attacks aimed at the Norwegian government since at least April.
This Cyber News was published on www.securityweek.com. Publication date: Thu, 21 Dec 2023 12:43:05 +0000