CVE-2025-5450

6.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated administrators with read-only permissions to modify restricted settings in Ivanti Connect Secure and Ivanti Policy Secure. Attackers with compromised admin credentials can escalate privileges and change system configurations. Organizations using affected versions of these products are at risk.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
Versions: Ivanti Connect Secure before 22.7R2.8, Ivanti Policy Secure before 22.7R1.5
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access with read-only permissions. All deployments with affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised read-only admin credentials could modify critical security settings, disable security controls, create backdoors, or disrupt VPN connectivity for all users.

🟠

Likely Case

An insider threat or external attacker with stolen credentials could modify certificate settings, potentially intercepting encrypted traffic or bypassing authentication mechanisms.

🟢

If Mitigated

With proper credential protection and network segmentation, impact is limited to unauthorized configuration changes that can be detected and rolled back.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid admin credentials but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Ivanti Connect Secure 22.7R2.8 or later, Ivanti Policy Secure 22.7R1.5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs

Restart Required: Yes

Instructions:

1. Download the latest patch from Ivanti support portal. 2. Backup current configuration. 3. Apply the patch following Ivanti's upgrade guide. 4. Restart the appliance. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to only trusted networks and implement multi-factor authentication for all admin accounts.

Monitor Certificate Changes

all

Implement monitoring for certificate management activities and alert on unexpected changes.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ivanti appliances from untrusted networks
  • Enforce strong password policies and multi-factor authentication for all admin accounts

🔍 How to Verify

Check if Vulnerable:

Check the appliance version via web admin interface or CLI. If version is below the patched versions, the system is vulnerable.

Check Version:

From CLI: show version full

Verify Fix Applied:

Verify the appliance version is at or above Ivanti Connect Secure 22.7R2.8 or Ivanti Policy Secure 22.7R1.5.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected certificate modifications
  • Configuration changes by read-only admin accounts
  • Failed authentication attempts followed by successful admin login

Network Indicators:

  • Unusual certificate changes in SSL/TLS handshakes
  • Changes to VPN authentication settings

SIEM Query:

source="ivanti*" AND (event_type="certificate_modification" OR event_type="config_change") AND user_role="readonly_admin"

🔗 References

📤 Share & Export