menu
close
close

Experienced a potential cyberattack or suspicious activity?

What are you looking for?
close
  • published 1/15/25 6:57 AM
  • updated 09 January 2025
  • 2 Min Read

Critical Zero-Day Vulnerability in Ivanti Connect Secure

Alert Rating

Critical

Audience

Corporations, Government

On this page

Critical Zero-Day Vulnerability in Ivanti Connect Secure

Ivanti has disclosed two vulnerabilities (CVE-2025-0282 and CVE-2025-0283) affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways. CVE-2025-0282, a critical stack-based buffer overflow vulnerability with a CVSS score of 9.0, is being actively exploited in the wild as a zero-day.

This flaw allows unauthenticated remote code execution. CVE-2025-0283, a high-severity vulnerability with a CVSS score of 7.0, enables local privilege escalation. Patches are available for Ivanti Connect Secure, while updates for Policy Secure and Neurons for ZTA are expected by January 21, 2025
 

Vulnerabilities Overview
 

1.    CVE-2025-0282: Stack-Based Buffer Overflow in Ivanti Connect Secure, Policy Secure, and ZTA Gateways

  • Severity: Critical (CVSS 9.0)
  • Impact: This vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on affected devices, potentially leading to complete system compromise.
  • Affects: Ivanti Connect Secure (versions 22.7R2 to 22.7R2.4), Ivanti Policy Secure (versions 22.7R1 to 22.7R1.2), Ivanti Neurons for ZTA Gateways (versions 22.7R2 to 22.7R2.3).
  • Exploitability: A successful attack can lead to remote code execution (RCE) without requiring authentication, making it a serious threat to affected systems.
  • Mitigation: Apply patches immediately. For Ivanti Connect Secure, the patch is available now (version 22.7R2.5). Patches for Ivanti Policy Secure and ZTA Gateways will be available by January 21, 2025.

 

2.    CVE-2025-0283: Stack-Based Buffer Overflow in Ivanti Connect Secure, Policy Secure, and ZTA Gateways

  • Severity: High (CVSS 7.0)
  • Impact: This vulnerability allows a local, authenticated attacker to escalate privileges, enabling unauthorized access to system functions.
  • Affects: Ivanti Connect Secure (versions 22.7R2.4 and earlier), Ivanti Policy Secure (versions 22.7R1.2 and earlier), Ivanti Neurons for ZTA Gateways (versions 22.7R2.3 and earlier).
  • Exploitability: Exploiting this flaw requires local authentication, but it can significantly compromise the security of a system by elevating an attacker's privileges.
  • Mitigation: For Ivanti Connect Secure, the patch is available now (version 22.7R2.5).Patches for Ivanti Policy Secure and ZTA Gateways will be available by January 21, 2025.
     

Take Action

Protect yourself
  • Immediately apply available patches for Ivanti Connect Secure.
  • Use Ivanti's Integrity Checker Tool (ICT) to identify potential exploitation of CVE-2025-0282
  • For unpatched systems, implement network segmentation and access restrictions.
  • Prepare to apply patches for Ivanti Policy Secure and Neurons for ZTA when released on January 21, 2025
  • Conduct thorough security audits and threat hunting activities on potentially affected systems
     

Attachments

Stay Connected

Follow our channels
Follow our social media channels to stay up to date.
Social Icon Social Icon Social Icon Social Icon Social Icon

Take Action

Spread Awareness

Share this threat to raise awareness and help others stay alert

GET INVOLVED

Make a Difference
Get involved with CSC and play a part in safeguarding the UAE's digital landscape.

Other Threats

20 January 2025

Alert rating

Critical

Critical Vulnerability in F5 Traffix SDC

A critical vulnerability has been discovered in F5 Traffix SDC, linked to Apache Tomcat, which could allow attackers to gain unauthorized access to compromised systems.

Protecting

Corporations, Government

share share

17 January 2025

Alert rating

High

Security Updates - NVIDIA

NVIDIA has released security updates to address multiple vulnerabilities in the NVIDIA Container Toolkit and NVIDIA GPU Operator.

Protecting

Corporations, Government

share share

16 January 2025

Alert rating

Critical

Critical Vulnerability in FortiSwitch Devices

A critical vulnerability (CVE-2023-37936) has been discovered in multiple versions of Fortinet FortiSwitch devices. This vulnerability, classified as a use of hard-coded cryptographic key [CWE-321], allows a remote unauthenticated attacker in possession of the key to execute unauthorized code via crafted cryptographic request.

Protecting

Corporations, Government

share share