CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
A security vulnerability within Ivanti Avalanche Manager before version 6.4.1 may allow an unauthenticated attacker to create a buffer overflow that could result in service disruption or arbitrary code execution.
Analysis
CVE-2023-38036 is a critical unauthenticated buffer overflow vulnerability in Ivanti Avalanche Manager prior to version 6.4.1 that allows remote attackers to cause denial of service or achieve arbitrary code execution without authentication. With a CVSS score of 9.8 and network-based attack vector, this vulnerability has significant real-world exploitability risk and affects all organizations deploying vulnerable Avalanche Manager instances.
Technical Context
The vulnerability exists in Ivanti Avalanche Manager, a mobile device management (MDM) and endpoint management solution. The root cause is classified as CWE-120 (Buffer Copy without Checking Size of Input, classic buffer overflow), indicating that the application fails to properly validate input size before copying data into a fixed-size buffer. This is a stack or heap-based buffer overflow vulnerability likely triggered through network input to a management service endpoint. The affected product line manages enterprise mobile and desktop devices, making the management interface itself a high-value attack target. Versions before 6.4.1 contain the vulnerable code path; the vulnerability is network-accessible (AV:N) with no authentication required (PR:N) and no user interaction needed (UI:N), indicating the flaw likely exists in an unauthenticated service endpoint or protocol handler.
Affected Products
Avalanche Manager (< 6.4.1)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2023-41863