Another Ivanti service has been forced to patch multiple security flaws

Security attack
(Image credit: Shutterstock / ozrimoz)

Ivanti has released fixes for more than two dozen vulnerabilities plaguing its Avalanche mobile device management (MDM) offering, including for two critical severity flaws that could be abused to execute code remotely.

In the accompanying security advisory Avalanche said the two flaws are tracked as CVE-2024-24996, and CVE-2024-29204. Both are described as heap-based buffer overflow bugs, allowing unauthenticated remote threat actors to trigger arbitrary commands on vulnerable endpoints. The attacks are low in complexity and don’t need any interaction on the victim’s side.

Besides these two flaws, Ivanti fixed another 25 bugs of varying severity, which could be abused to mount denial-of-service attacks, run arbitrary commands as SYSTEM, read sensitive information from memory, and more. The company says there is no evidence of real-life abuse just yet, and advises its users to apply the fixes as soon as possible.

What is Ivanti Avalanche?

"We are not aware of any customers being exploited by these vulnerabilities prior to public disclosure. These vulnerabilities were disclosed through our responsible disclosure program," the company said. "To address the security vulnerabilities listed below, it is highly recommended to download the Avalanche installer and update to the latest Avalanche 6.4.3."

The patch and necessary version information can be found on this link

Ivanti Avalanche is a mobile device management (MDM) solution that helps organizations manage and secure their mobile devices, such as smartphones, tablets, and ruggedized handheld devices. It provides capabilities for device provisioning, configuration management, software distribution, remote troubleshooting, and security enforcement.

Avalanche allows IT administrators to centrally manage a diverse fleet of mobile devices across different operating systems (like iOS, Android, Windows) and device types up to over 100,000 devices.

This includes tasks like deploying applications, enforcing security policies, and remotely troubleshooting issues. It's often used in environments where there's a large number of mobile devices deployed, such as in retail, healthcare, logistics, and manufacturing sectors.

Via BleepingComputer

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Representational image depecting cybersecurity protection
Ivanti reveals major security update, so make sure you're protected
vpn
Ivanti warns another critical security flaw is being attacked
A person at a laptop with a cybersecure lock symbol floating above it.
Hackers are still using old Ivanti bugs to break into networks
An image of network security icons for a network encircling a digital blue earth.
Industrial networks exposed to attack by faulty Moxa devices
A person's fingers type at a keyboard, with a digital security screen with a lock on it overlaid.
Veeam backup software has a serious security flaw - here's how to stay safe
Security
Broadcom releases fixes for multiple VMware security flaws
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Meta warns of worrying security flaw hitting open source type software
Hand holding smartphone and scan fingerprint biometric identity for unlock her mobile phone
Biometrics add another layer of security to passwordless authentication
Data leak
Hacked Tata Technologies data leaked by ransomware gang
Latest in News
Google Gemini Flash 2.0 Images
I tried Gemini's new AI image generation tool - here are 5 ways to get the best art from Google's Flash 2.0
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Eurocom Raptor X18
At $15,000, this massive 256GB RAM laptop makes Apple's MacBook Pro look affordable, tiny and very, very slow
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character
A graphic of the PC Gaming Show
Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
A close up of The Daily podcast from Pocket Casts' web page
‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web player free to all