CVE-2025-22457

9.0 CRITICAL CISA KEV

📋 TL;DR

A stack-based buffer overflow vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA Gateways allows remote unauthenticated attackers to execute arbitrary code on affected systems. This affects organizations using these Ivanti products before specific patched versions. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateways
Versions: Connect Secure before 22.7R2.6, Policy Secure before 22.7R1.4, ZTA Gateways before 22.8R2.2
Operating Systems: All supported Ivanti appliance OS versions
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/admin privileges, establishing persistent access, and pivoting to internal networks.

🟠

Likely Case

Remote code execution leading to data theft, ransomware deployment, or use as a foothold for further attacks.

🟢

If Mitigated

Attack blocked at perimeter with proper patching and network segmentation limiting lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.6, Policy Secure 22.7R1.4, ZTA Gateways 22.8R2.2

Vendor Advisory: https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch via Ivanti appliance admin interface. 4. Reboot the appliance. 5. Verify patch installation and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Ivanti appliances to only trusted IP addresses using firewall rules.

Disable Unnecessary Services

all

Disable any unnecessary services or interfaces on the Ivanti appliances to reduce attack surface.

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet access and place behind strict firewall rules.
  • Implement network monitoring and intrusion detection specifically for exploit attempts against this CVE.

🔍 How to Verify

Check if Vulnerable:

Check the appliance version in the Ivanti admin interface under System > Maintenance > Version Information.

Check Version:

ssh admin@ivanti-appliance 'show version' or check via web admin interface

Verify Fix Applied:

Verify the version number matches or exceeds the patched versions listed in the affected systems section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation, unexpected network connections from appliance, authentication failures from appliance

Network Indicators:

  • Unusual traffic patterns to/from Ivanti appliances, exploit-specific payloads in network traffic

SIEM Query:

source="ivanti_appliance" AND (event_type="process_creation" OR event_type="network_connection") AND severity=HIGH

🔗 References

📤 Share & Export