Home Ivanti CVE-2024-37399
Back to Ivanti

CVE-2024-37399

Ivanti Avalanche - WLAvalancheService

Ivanti CVSS 7.5 Updated March 16, 2026

Executive Risk Summary

"A NULL pointer dereference vulnerability in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to crash the WLAvalancheService, resulting in a Denial of Service (DoS). This vulnerability can be exploited to disrupt the service, causing potential downtime and impacting business operations."

Operational Audit Arsenal

Target Type Service
Target Asset WLAvalancheService
Standard Path %ProgramFiles%IvantiAvalanche
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: WLAvalancheService (Service)
$Targets = 'WLAvalancheService'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Service disruption during patching

Internal Work Notes

Ivanti Avalanche 6.3.1 is vulnerable to a NULL pointer dereference in WLAvalancheService, allowing remote unauthenticated attackers to crash the service. Upgrade to a patched version (e.g., Ivanti Avalanche 6.4.4) to mitigate the vulnerability.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Ivanti Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.