Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-25149 | An Use-after-free vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM. |
Wed, 17 Dec 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 06 May 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-12-16T18:13:22.068Z
Reserved: 2024-02-29T01:04:06.640Z
Link: CVE-2024-27975
Updated: 2024-08-02T00:41:55.949Z
Status : Analyzed
Published: 2024-04-19T02:15:10.007
Modified: 2025-05-06T14:30:56.723
Link: CVE-2024-27975
No data.
OpenCVE Enrichment
No data.
EUVD