Home Ivanti CVE-2024-37373
Back to Ivanti

CVE-2024-37373

Ivanti Avalanche - Central Filestore

Ivanti CVSS 7.2 Updated March 16, 2026

Executive Risk Summary

"A remote authenticated attacker with admin rights can achieve remote code execution (RCE) in Ivanti Avalanche 6.3.1 due to improper input validation in the Central Filestore. This vulnerability poses a significant risk to the integrity and security of the affected systems, allowing attackers to execute arbitrary code and potentially gain control of the system."

Operational Audit Arsenal

Target Type Filestore
Target Asset Central Filestore
Standard Path Global Configuration

Manual Verification Required

This is a non-Windows asset (Ivanti). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Ivanti Avalanche 6.3.1 is vulnerable to RCE due to improper input validation in the Central Filestore, patching to version 6.4.4 or later is recommended to mitigate this risk.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.