CVE-2025-5468

5.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated local attackers to read arbitrary files on disk through improper symbolic link handling in Ivanti secure access products. It affects Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access. Attackers must already have local authenticated access to exploit this flaw.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.8 or 22.8R2; Policy Secure before 22.7R1.5; ZTA Gateway before 22.8R2.3-723; Neurons for Secure Access before 22.8R1.4
Operating Systems: All supported Ivanti appliance platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. Fix was deployed on August 2, 2025.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive configuration files, credentials, or other critical data could be exfiltrated, potentially leading to privilege escalation or lateral movement within the network.

🟠

Likely Case

Local authenticated users could read files they shouldn't have access to, potentially exposing sensitive configuration data or system information.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authenticated users reading files they shouldn't access, but no code execution or system compromise.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this to read sensitive files, but requires existing access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of symbolic link manipulation. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure: 22.7R2.8 or 22.8R2; Policy Secure: 22.7R1.5; ZTA Gateway: 22.8R2.3-723; Neurons for Secure Access: 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US

Restart Required: No

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Apply patch via web admin interface. 3. Verify patch installation in system logs. 4. Test functionality after patching.

🔧 Temporary Workarounds

Restrict Local User Access

all

Limit local authenticated user accounts to only necessary personnel and implement least privilege access controls.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all local user activity
  • Deploy file integrity monitoring to detect unauthorized file access attempts

🔍 How to Verify

Check if Vulnerable:

Check current version via web admin interface or CLI and compare against affected versions list.

Check Version:

ssh admin@[appliance-ip] 'show version' or check via web admin dashboard

Verify Fix Applied:

Verify version number matches or exceeds patched versions in admin interface and check for August 2025 security updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns by local users
  • Multiple failed file access attempts
  • Symbolic link creation/modification events

Network Indicators:

  • Unusual outbound data transfers from appliance
  • Unexpected file access patterns

SIEM Query:

source="ivanti_appliance" AND (event_type="file_access" OR event_type="symlink") AND user!="system"

🔗 References

📤 Share & Export