Stack-Based Buffer Overflow in Ivanti Connect Secure and Policy Secure
CVE-2025-0282
Key Information:
- Vendor
- Ivanti
- Vendor
- CVE Published:
- 8 January 2025
Badges
What is CVE-2025-0282?
CVE-2025-0282 is a critical vulnerability affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways. These products are designed to provide secure access to enterprise applications and resources. This specific vulnerability is a stack-based buffer overflow that could allow a remote, unauthenticated attacker to execute arbitrary code on affected systems. If exploited, this flaw poses a serious risk to organizations as it could potentially lead to unauthorized access to sensitive data and disruption of services.
Technical Details
The vulnerability resides in the code handling within Ivantiβs secure access technologies. Versions prior to 22.7R2.5 for Connect Secure, 22.7R1.2 for Policy Secure, and 22.7R2.3 for Neurons for ZTA gateways are affected. The stack-based buffer overflow leaves the system open to malicious input that can manipulate execution flow, enabling an attacker to run arbitrary commands remotely. This flaw underscores the importance of proper input validation and memory management in software development to prevent similar vulnerabilities.
Potential Impact of CVE-2025-0282
-
Remote Code Execution: An attacker could exploit the vulnerability to run arbitrary code on the affected devices, leading to complete control over the system.
-
Data Breaches: Unauthorized access could result in the exposure and theft of sensitive data, impacting organizational confidentiality and compliance with data protection regulations.
-
Service Disruption: Successful exploitation could allow attackers to manipulate or disrupt services, leading to downtime and loss of operational capabilities, which can be particularly damaging for businesses relying on seamless access to secure applications.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.
Affected Version(s)
Connect Secure 22.7R2 <= 22.7R2.4
Neurons for ZTA gateways 22.7R2 <= 22.7R2.3
Policy Secure 22.7R1 <= 22.7R1.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
New PoC Released For Ivanti Connect Secure RCE Vulnerability (CVE-2025-0282)
Researchers have unveiled a PoC exploit for a critical RCE flaw in Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways.
18 hours ago
Threat Brief: CVE-2025-0282 and CVE-2025-0283
CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident response case. CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident respons...
1 day ago
33,542 Ivanti Connect Secure Instances Exposed as Exploitation of CVE-2025-0282 Unfolds
A critical security vulnerability, CVE-2025-0282, has been identified and exploited in the wild, affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways.
5 days ago
References
EPSS Score
15% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- π₯
Vulnerability reached the number 1 worldwide trending spot
- π°
Used in Ransomware
- π
Vulnerability started trending
- π°
First article discovered by Help Net Security
- πΎ
Exploit known to exist
- π¦
CISA Reported
Vulnerability published
Vulnerability Reserved