Stack-Based Buffer Overflow in Ivanti Connect Secure, Policy Secure, and Neurons for ZTA Gateways
CVE-2025-0283

7HIGH

Key Information:

Vendor

Ivanti

Vendor
CVE Published:
8 January 2025

Badges

🟣 EPSS 22%πŸ“° News Worthy

What is CVE-2025-0283?

A stack-based buffer overflow vulnerability exists in Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA Gateways before specified versions. This flaw enables a local authenticated attacker to exploit the overflow condition, potentially leading to privilege escalation and unauthorized access to sensitive functionalities within the affected platforms.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Connect Secure 22.7R2.5

Neurons for ZTA gateways 22.7R2.5

Policy Secure 22.7R1.2

News Articles

Threat Brief: CVE-2025-0282 and CVE-2025-0283

CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident response case. CVE-2025-0282 and CVE-2025-0283 affect multiple Ivanti products. This threat brief covers attack scope, including details from an incident respons...

Critical Ivanti Vulnerabilities Addressed With Latest Patch

These Ivanti vulnerabilities, identified as CVE-2025-0282 and CVE-2025-0283, pose serious risks to users of affected versions.

Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways

Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.

References

EPSS Score

22% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“°

    First article discovered by Infosecurity Magazine

  • Vulnerability published

  • Vulnerability Reserved

.