A NULL pointer dereference in WLAvalancheService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS.
Metrics
Affected Vendors & Products
References
History
Thu, 15 Aug 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:ivanti:avalanche:6.3.1.1507:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.1:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.2.3490:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:*:windows:*:* cpe:2.3:a:ivanti:avalanche:6.3.2:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.3.101:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.3:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.4.153:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.3.4:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.4.1.207:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.4.1.236:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:ivanti:avalanche:6.4.1:*:*:*:premise:*:*:* cpe:2.3:a:ivanti:avalanche:6.4.2:*:*:*:premise:*:*:* |
|
Metrics |
cvssV3_1
|
Wed, 14 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ivanti
Ivanti avalanche |
|
Weaknesses | CWE-476 | |
CPEs | cpe:2.3:a:ivanti:avalanche:-:*:*:*:premise:*:*:* | |
Vendors & Products |
Ivanti
Ivanti avalanche |
|
Metrics |
ssvc
|
Wed, 14 Aug 2024 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A NULL pointer dereference in WLAvalancheService in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the service, resulting in a DoS. | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-14T13:46:39.793Z
Reserved: 2024-06-08T01:04:07.093Z
Link: CVE-2024-37399

Updated: 2024-08-14T13:30:42.922Z

Status : Analyzed
Published: 2024-08-14T03:15:04.850
Modified: 2024-08-15T17:31:49.067
Link: CVE-2024-37399

No data.