cve/2023/CVE-2023-32560.md

20 lines
889 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-32560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32560)
![](https://img.shields.io/static/v1?label=Product&message=Avalanche&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An attacker can send a specially crafted message to the Wavelink Avalanche Manager, which could result in service disruption or arbitrary code execution.Thanks to a Researcher at Tenable for finding and reporting.Fixed in version 6.4.1.
### POC
#### Reference
- http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/x0rb3l/CVE-2023-32560