¡¾Îó²îͨ¸æ¡¿Ivanti Avalanche¶à¸ö¸ßΣÎó²î

Ðû²¼Ê±¼ä 2023-08-16


Ò»¡¢Îó²î¸ÅÊö

Ivanti Avalanche£¨ÓÉ Wavelink Ìṩ֧³Ö£©ÊÇÒ»ÖÖÆóÒµÒÆ¶¯ÖÎÀí (EMM) ½â¾ö¼Æ»®£¬Ö¼ÔÚÖÎÀí¡¢¼à¿ØºÍ± £»¤ÖÖÖÖÒÆ¶¯×°±¸ ¡£

8ÔÂ16ÈÕ£¬×ðÁú¿­Ê±VSRC¼à²âµ½Ivanti AvalancheÖÐÐÞ¸´Á˶à¸öÇå¾²Îó²î£¬ÕâЩÎó²î¿ÉÄܵ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ý¡¢ÎļþÉÏ´«¡¢Ä¿Â¼±éÀúºÍÔ¶³Ì´úÂëÖ´ÐеÈ£¬ÏêÇéÈçÏ£º

CVE-2023-32560£ºIvanti Avalanche»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³ö£¨¸ßΣ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche WLAvalancheService.exeÖУ¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕß¿Éͨ¹ýÏòTCP ¶Ë¿Ú 1777·¢ËÍÌØÖÆÐÂÎÅ£¬¿ÉÄܵ¼ÖÂÔÚÄ¿µÄϵͳÉÏÖ´ÐÐí§Òâ´úÂë»òÔì³É·þÎñÖÐÖ¹£¬¸ÃÎó²îµÄϸ½ÚÒѹûÕæ ¡£

CVE-2023-32561£ºIvanti AvalancheÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨¸ßΣ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche dumpHeapÒªÁìÖУ¬ÓÉÓÚȨÏÞ·ÖÅɲ»×¼È·£¬Ô¶³ÌÍþвÕß¿ÉʹÓøÃÎó²îÈÆ¹ýϵͳÉϵÄÉí·ÝÑéÖ¤ ¡£

CVE-2023-32562£ºIvanti AvalancheÎļþÉÏ´«Îó²î£¨¸ßΣ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche FileStoreConfig¶ËµãÖУ¬ÓÉÓÚ¶ÔÓû§ÌṩµÄÊý¾Ýȱ·¦Êʵ±ÑéÖ¤£¬¾­ÓÉÉí·ÝÑéÖ¤µÄÍþвÕß¿ÉʹÓøÃÎó²îÉÏ´«í§ÒâÎļþ£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ ¡£

CVE-2023-32563£ºIvanti AvalancheĿ¼±éÀúÎó²î£¨ÑÏÖØ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche updateSkinÒªÁìÖУ¬ÓÉÓÚÔÚÎļþ²Ù×÷ÖÐʹÓÃÓû§ÌṩµÄ·¾¶Ö®Ç°Î´¶ÔÆä¾ÙÐÐ׼ȷÑéÖ¤£¬µ¼ÖÂĿ¼±éÀúÎó²î£¬Î´¾­Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉʹÓøÃÎó²îÔ¶³ÌÖ´ÐдúÂë ¡£

CVE-2023-32564£ºIvanti AvalancheÎļþÉÏ´«Îó²î£¨¸ßΣ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche FileStoreConfigÖУ¬ÓÉÓÚ¶ÔÓû§ÌṩµÄÊý¾Ýȱ·¦Êʵ±ÑéÖ¤£¬¾­ÓÉÉí·ÝÑéÖ¤µÄÍþвÕß¿ÉʹÓøÃÎó²îÉÏ´«í§ÒâÎļþ£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÐ ¡£

CVE-2023-32565£ºIvanti Avalanche SecureFilter Content-TypeÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨¸ßΣ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche SecureFilterÀàÖУ¬ÓÉÓÚÔÚÊÚȨÂß¼­Öв»×¼È·µØÊ¹Óà Content-Type HTTP ±êÍ·£¬Ô¶³ÌÍþвÕß¿Éͨ¹ý·¢ËÍÌØÖÆÇëÇó£¬ÈƹýϵͳÉϵIJ¿·ÖÉí·ÝÑéÖ¤ ¡£

CVE-2023-32566£ºIvanti Avalanche SecureFilter allowedPassThroughÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨¸ßΣ£©

¸ÃÎó²î±£´æÓÚIvanti Avalanche SecureFilter allowedPassThroughÒªÁìÖУ¬ÓÉÓÚ×ö³öÊÚȨ¾öÒéʱ×Ö·û´®Æ¥Å䲻׼ȷ£¬Ô¶³ÌÍþвÕß¿Éͨ¹ý·¢ËÍÌØÖÆÇëÇó£¬ÈƹýϵͳÉϵIJ¿·ÖÉí·ÝÑéÖ¤ ¡£

  

¶þ¡¢Ó°Ïì¹æÄ£

Ivanti Avalanche°æ±¾ <= 6.4.0 


Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚÕâЩÎó²îÒѾ­ÐÞ¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º

Ivanti Avalanche°æ±¾ >= 6.4.1.207

ÏÂÔØÁ´½Ó£º

https://forums.ivanti.com/s/avalanche-powered-by-wavelink?language=en_US

3.2 ÔÝʱ²½·¥

ÔÝÎÞ ¡£

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬ïÔ̭ϵͳÎó²î£¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ ¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬Ð޸ķÀ»ðǽսÂÔ£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬ïÔÌ­½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬ïÔÌ­¹¥»÷Ãæ ¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ ¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È ¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐÞ¸Ä ¡£

3.4 ²Î¿¼Á´½Ó

https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1

https://www.tenable.com/security/research/tra-2023-27

https://www.bleepingcomputer.com/news/security/ivanti-avalanche-impacted-by-critical-pre-auth-stack-buffer-overflows/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-08-16

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ×ðÁú¿­Ê±¼ò½é

×ðÁú¿­Ê±½¨ÉèÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Çå¾²·þÎñ½â¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò» ¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°×ðÁú¿­Ê±´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕ·þÎñÍŶÓ1300ÓàÈË ¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊÐ ¡££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬×ðÁú¿­Ê±ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢ ¡£

5.2 ¹ØÓÚ×ðÁú¿­Ê±

×ðÁú¿­Ê±Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½ ¡£

¹Ø×¢ÎÒÃÇ£º

image.png