CVE-2025-55139

6.8 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in multiple Ivanti security products that allows authenticated administrators to enumerate internal services. Attackers with admin privileges can make the vulnerable system send requests to internal network resources, potentially discovering sensitive services. This affects Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access before specific patched versions.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2, Policy Secure before 22.7R1.6, ZTA Gateway before 2.8R2.3-723, Neurons for Secure Access before 22.8R1.4
Operating Systems: All supported OS versions for these products
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised admin credentials could map the entire internal network, discover sensitive services (databases, management interfaces, internal APIs), and potentially chain this with other vulnerabilities for lateral movement or data exfiltration.

🟠

Likely Case

Malicious insiders or attackers with stolen admin credentials will use this to discover internal services for reconnaissance, potentially identifying additional attack targets within the network.

🟢

If Mitigated

With proper network segmentation and admin credential protection, impact is limited to service enumeration within accessible network segments only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin credentials. Exploitation involves crafting SSRF requests to enumerate internal services.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2, Policy Secure 22.7R1.6, ZTA Gateway 2.8R2.3-723, Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US

Restart Required: No

Instructions:

1. Log into Ivanti support portal. 2. Download appropriate patch for your product version. 3. Apply patch according to Ivanti documentation. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin access to only trusted personnel and implement multi-factor authentication for all admin accounts.

Network Segmentation

all

Implement strict network segmentation to limit what internal services the vulnerable systems can reach.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from sensitive internal services
  • Enforce strong authentication and monitoring for all admin accounts, implement just-in-time admin access

🔍 How to Verify

Check if Vulnerable:

Check product version in admin interface against affected versions list. If version is earlier than patched versions, system is vulnerable.

Check Version:

Check via product admin interface or CLI: show version (product-specific)

Verify Fix Applied:

Verify version shows patched version in admin interface. Test SSRF functionality is no longer exploitable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • Multiple HTTP requests to internal IP ranges from admin accounts
  • Failed connection attempts to internal services

Network Indicators:

  • Unusual outbound connections from Ivanti systems to internal services
  • Port scanning patterns originating from Ivanti systems

SIEM Query:

source="ivanti*" AND (event_type="admin_login" OR http_request) AND dest_ip=INTERNAL_SUBNET

🔗 References

📤 Share & Export