CVE-2025-0292

5.5 MEDIUM

📋 TL;DR

This SSRF vulnerability in Ivanti Connect Secure and Policy Secure allows authenticated administrators to make requests to internal network services from the vulnerable appliance. Attackers with admin credentials can potentially access sensitive internal systems that should not be exposed. Organizations running affected versions of these Ivanti products are at risk.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
Versions: Connect Secure before 22.7R2.8, Policy Secure before 22.7R1.5
Operating Systems: Ivanti's custom OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication - not exploitable by regular users or unauthenticated attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised admin credentials could pivot through the Ivanti appliance to access internal services, potentially reaching sensitive systems like databases, management interfaces, or cloud metadata services, leading to data exfiltration or further network compromise.

🟠

Likely Case

An attacker with legitimate or stolen admin credentials probes internal network services to map infrastructure, potentially accessing internal web applications or APIs that weren't intended to be exposed externally.

🟢

If Mitigated

With proper network segmentation and admin credential protection, the impact is limited to accessing only those internal services reachable from the Ivanti appliance's network segment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but the SSRF mechanism itself is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.8 or later, Policy Secure 22.7R1.5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch via admin interface. 4. Reboot appliance. 5. Verify version update.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin account access to trusted IP addresses only

Configure admin access controls in Ivanti admin interface to restrict source IPs

Network Segmentation

all

Isolate Ivanti appliances from sensitive internal networks

Configure firewall rules to limit Ivanti appliance network access to only required services

🧯 If You Can't Patch

  • Implement strict network segmentation to limit what internal services the Ivanti appliance can reach
  • Enforce strong authentication and monitoring for admin accounts, consider MFA if supported

🔍 How to Verify

Check if Vulnerable:

Check current version in Ivanti admin interface under System > Maintenance > Version Information

Check Version:

ssh admin@ivanti-appliance 'show version' or check via web admin interface

Verify Fix Applied:

Verify version shows Connect Secure 22.7R2.8+ or Policy Secure 22.7R1.5+ after patching

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • HTTP requests from Ivanti appliance to internal services not normally accessed
  • Multiple failed admin login attempts

Network Indicators:

  • Unexpected outbound connections from Ivanti appliance to internal services
  • Traffic patterns suggesting internal network scanning

SIEM Query:

source="ivanti_appliance" AND (event_type="admin_login" OR http_request) AND dest_ip IN (internal_subnets)

🔗 References

📤 Share & Export