CVE-2025-5463

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local authenticated attackers to access sensitive information that was improperly logged in Ivanti Connect Secure and Policy Secure systems. Attackers with valid local credentials can read log files containing sensitive data. Organizations using affected versions of these Ivanti products are at risk.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
Versions: Connect Secure before 22.7R2.8, Policy Secure before 22.7R1.5
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain credentials, API keys, or other sensitive data from logs, leading to lateral movement, privilege escalation, or data exfiltration.

🟠

Likely Case

Malicious insiders or compromised accounts access sensitive information stored in logs, potentially exposing credentials or configuration details.

🟢

If Mitigated

With proper access controls and log monitoring, unauthorized access attempts are detected and prevented before sensitive data is extracted.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access to read log files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.8 or later, Policy Secure 22.7R1.5 or later

Vendor Advisory: https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVES

Restart Required: Yes

Instructions:

1. Download the latest patch from Ivanti support portal. 2. Apply the patch following Ivanti's upgrade documentation. 3. Restart the affected services or system as required.

🔧 Temporary Workarounds

Restrict log file access

linux

Implement strict file permissions on log directories to prevent unauthorized reading.

chmod 640 /var/log/ivanti/*
chown root:admin /var/log/ivanti/*

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for local user accounts.
  • Regularly audit and sanitize log files to remove sensitive information.

🔍 How to Verify

Check if Vulnerable:

Check the current version via Ivanti admin interface or CLI and compare against affected versions.

Check Version:

show version

Verify Fix Applied:

Confirm version is at least Connect Secure 22.7R2.8 or Policy Secure 22.7R1.5.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to log files
  • Failed attempts to access restricted log directories

SIEM Query:

source="ivanti_logs" AND (event="file_access" AND target_file="*.log") AND user!="authorized_user"

🔗 References

📤 Share & Export