Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
avalanche Vendor: ivanti

About This Product

avalanche is a software product offered by ivanti. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 117 known vulnerabilities affecting ivanti avalanche. This includes 43 critical-severity issues and 67 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2025, indicating a sustained research interest and ongoing security attention. 7 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-8901 2018-06-29 2024-11-21 7.8 2.1 Unknown
CVE-2018-8902 2018-06-29 2024-11-21 6.5 4.0 Likely
CVE-2020-12442 2020-04-28 2024-11-21 9.8 7.5 Likely
CVE-2021-42124 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42125 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42126 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42127 2021-12-07 2024-11-21 9.8 7.5 Likely
CVE-2021-42128 2021-12-07 2024-11-21 9.8 7.5 Likely
CVE-2021-42129 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42130 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42131 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42132 2021-12-07 2024-11-21 8.8 6.5 Likely
CVE-2021-42133 2021-12-07 2024-11-21 8.1 5.5 Likely
CVE-2021-30497 2022-04-06 2024-11-21 7.5 5.0 Likely
CVE-2022-44574 2023-03-10 2024-11-21 7.5 - -
CVE-2022-36971 2023-03-29 2024-11-21 8.8 - -
CVE-2022-36972 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36973 2023-03-29 2024-11-21 8.8 - -
CVE-2022-36974 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36975 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36976 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36977 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36978 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36979 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36980 2023-03-29 2024-11-21 8.1 - -
CVE-2022-36981 2023-03-29 2024-11-21 9.8 - -
CVE-2022-36982 2023-03-29 2024-11-21 7.5 - -
CVE-2022-36983 2023-03-29 2024-11-21 9.8 - -
CVE-2023-28125 2023-05-09 2025-01-29 5.9 - -
CVE-2023-28126 2023-05-09 2025-01-29 5.9 - -
CVE-2023-28127 2023-05-09 2025-01-28 7.5 - -
CVE-2023-28128 2023-05-09 2025-01-28 7.2 - -
CVE-2023-32566 2023-08-10 2024-11-21 9.1 - -
CVE-2023-32567 2023-08-10 2024-11-21 9.8 - -
CVE-2023-32560 2023-08-10 2025-03-06 9.8 - -
CVE-2023-32561 2023-08-10 2025-03-06 7.5 - -
CVE-2023-32562 2023-08-10 2025-03-06 9.8 - -
CVE-2023-32563 2023-08-10 2024-11-21 9.8 - -
CVE-2023-32564 2023-08-10 2024-11-21 9.8 - -
CVE-2023-32565 2023-08-10 2024-11-21 9.1 - -
CVE-2022-43554 2023-11-03 2024-11-21 7.8 - -
CVE-2022-43555 2023-11-03 2024-11-21 7.8 - -
CVE-2023-41725 2023-11-03 2024-11-21 7.8 - -
CVE-2023-41726 2023-11-03 2024-11-21 7.8 - -
CVE-2021-22962 2023-12-19 2024-11-21 9.1 - -
CVE-2023-41727 2023-12-19 2025-05-06 9.8 - -
CVE-2023-46216 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46217 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46220 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46221 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46222 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46223 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46224 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46225 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46257 2023-12-19 2025-05-06 9.8 - -
CVE-2023-46258 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46259 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46260 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46261 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46262 2023-12-19 2024-11-21 7.5 - -
CVE-2023-46263 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46264 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46265 2023-12-19 2024-11-21 9.8 - -
CVE-2023-46266 2023-12-19 2024-11-21 9.1 - -
CVE-2023-46803 2023-12-19 2024-11-21 7.5 - -
CVE-2023-46804 2023-12-19 2024-11-21 7.5 - -
CVE-2023-41474 2024-01-25 2025-06-12 6.5 - -
CVE-2024-22061 2024-04-19 2025-05-06 9.8 - -
CVE-2024-23526 2024-04-19 2025-05-06 7.5 - -
CVE-2024-23528 2024-04-19 2025-05-06 7.5 - -
CVE-2024-23529 2024-04-19 2025-05-06 7.5 - -
CVE-2024-23530 2024-04-19 2025-05-06 7.5 - -
CVE-2024-23531 2024-04-19 2025-05-06 7.5 - -
CVE-2024-23532 2024-04-19 2025-05-06 7.5 - -
CVE-2024-23533 2024-04-19 2025-05-06 6.5 - -
CVE-2024-23534 2024-04-19 2025-05-06 8.8 - -
CVE-2024-23535 2024-04-19 2025-05-06 8.8 - -
CVE-2024-24991 2024-04-19 2025-05-06 6.5 - -
CVE-2024-24992 2024-04-19 2025-05-06 8.8 - -
CVE-2024-24993 2024-04-19 2025-05-06 7.5 - -
CVE-2024-24994 2024-04-19 2025-05-06 8.8 - -
CVE-2024-24995 2024-04-19 2025-05-06 7.5 - -
CVE-2024-24996 2024-04-19 2025-05-06 9.8 - -
CVE-2024-24997 2024-04-19 2025-05-06 8.8 - -
CVE-2024-24998 2024-04-19 2025-05-06 8.8 - -
CVE-2024-24999 2024-04-19 2025-05-06 8.8 - -
CVE-2024-25000 2024-04-19 2025-05-06 8.8 - -
CVE-2024-27975 2024-04-19 2025-05-06 8.8 - -
CVE-2024-27976 2024-04-19 2025-05-06 8.8 - -
CVE-2024-27977 2024-04-19 2025-05-06 8.1 - -
CVE-2024-27978 2024-04-19 2025-05-06 6.5 - -
CVE-2024-27984 2024-04-19 2025-05-06 7.1 - -
CVE-2024-29204 2024-04-19 2025-05-06 9.8 - -
CVE-2024-23527 2024-04-25 2025-05-06 7.5 - -
CVE-2024-29848 2024-05-31 2025-05-06 7.2 - -
CVE-2024-36136 2024-08-14 2024-08-15 7.5 - -
CVE-2024-37373 2024-08-14 2024-08-15 7.2 - -
CVE-2024-37399 2024-08-14 2024-08-15 7.5 - -
CVE-2024-38652 2024-08-14 2024-08-15 9.1 - -
CVE-2024-38653 2024-08-14 2024-08-15 7.5 - -
CVE-2024-47007 2024-10-08 2024-10-16 7.5 - -
CVE-2024-47008 2024-10-08 2024-10-16 7.5 - -
CVE-2024-47009 2024-10-08 2024-10-16 7.3 - -
CVE-2024-47010 2024-10-08 2024-10-16 7.3 - -
CVE-2024-47011 2024-10-08 2024-10-16 7.5 - -
CVE-2024-50317 2024-11-12 2024-11-18 7.5 - -
CVE-2024-50318 2024-11-12 2024-11-18 7.5 - -
CVE-2024-50319 2024-11-12 2024-11-18 7.5 - -
CVE-2024-50320 2024-11-12 2024-11-18 7.5 - -
CVE-2024-50321 2024-11-12 2024-11-18 7.5 - -
CVE-2024-50331 2024-11-12 2024-12-18 7.5 - -
CVE-2024-13179 2025-01-14 2025-01-16 7.3 - -
CVE-2024-13180 2025-01-14 2025-01-16 7.5 - -
CVE-2024-13181 2025-01-14 2025-01-16 7.3 - -
CVE-2023-38036 2025-07-12 2025-07-17 9.8 - -
CVE-2025-8296 2025-08-12 2025-08-15 7.2 - -
CVE-2025-8297 2025-08-12 2025-08-15 7.2 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ivanti avalanche by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.