CVE-2025-22454

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in Ivanti Secure Access Client where insufficient permissions allow authenticated local users to gain elevated privileges. It affects users running Ivanti Secure Access Client versions before 22.7R4. An attacker with local access can exploit this to execute code with higher privileges than intended.

💻 Affected Systems

Products:
  • Ivanti Secure Access Client (ISAC)
Versions: All versions before 22.7R4
Operating Systems: Windows, Linux, macOS (if applicable)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the system. The vulnerability is in the client software, not the Ivanti Secure Access server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full system administrator/root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement within the network.

🟠

Likely Case

Local authenticated users (including low-privilege accounts) escalate to administrative privileges, allowing them to install malware, modify system configurations, or access sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained, limiting impact to isolated systems.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated local access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Internal users with local access (including compromised accounts) can exploit this to gain administrative privileges on affected endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The CWE-732 (Incorrect Permission Assignment) suggests misconfigured permissions that could be relatively straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.7R4 and later

Vendor Advisory: https://forums.ivanti.com/s/article/March-Security-Advisory-Ivanti-Secure-Access-Client-ISAC-CVE-2025-22454

Restart Required: Yes

Instructions:

1. Download Ivanti Secure Access Client version 22.7R4 or later from the Ivanti portal. 2. Uninstall the previous version. 3. Install the updated version. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local login access to trusted administrative users only to reduce attack surface.

Monitor Privilege Escalation Attempts

all

Enable auditing for privilege escalation events and monitor security logs for suspicious activity.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for local user accounts
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check the Ivanti Secure Access Client version in the application's about section or via system installed programs list.

Check Version:

On Windows: Check Programs and Features or run 'wmic product where name="Ivanti Secure Access Client" get version'. On Linux: Check package manager or installed applications list.

Verify Fix Applied:

Verify the installed version is 22.7R4 or later and check that no unauthorized privilege escalation events are logged.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Unauthorized process execution with elevated privileges
  • Changes to system permissions or user rights

Network Indicators:

  • Unusual outbound connections from previously low-privilege accounts
  • Lateral movement attempts from compromised endpoints

SIEM Query:

EventID=4672 (Special privileges assigned to new logon) OR EventID=4688 (Process creation) with elevated privileges from non-admin users

🔗 References

📤 Share & Export