CVE-2025-55141

8.8 HIGH

📋 TL;DR

This CVE describes a missing authorization vulnerability in Ivanti security products that allows authenticated users with read-only admin privileges to modify authentication settings. Attackers could potentially reconfigure authentication mechanisms to bypass security controls or gain elevated access. Organizations using affected Ivanti Connect Secure, Policy Secure, ZTA Gateway, or Neurons for Secure Access versions are vulnerable.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2; Policy Secure before 22.7R1.6; ZTA Gateway before 2.8R2.3-723; Neurons for Secure Access before 22.8R1.4
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with read-only admin privileges. Fix was deployed on August 2, 2025.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reconfigure authentication settings to create backdoor accounts, disable multi-factor authentication, or redirect authentication to malicious servers, potentially leading to complete system compromise.

🟠

Likely Case

Attackers with existing read-only admin access could elevate privileges to modify authentication settings, potentially enabling further lateral movement or persistence within the network.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized configuration changes could be detected and reverted before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with read-only admin privileges. The vulnerability is in authorization logic, making exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2; Policy Secure 22.7R1.6; ZTA Gateway 2.8R2.3-723; Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US

Restart Required: Yes

Instructions:

1. Review the vendor advisory for specific upgrade paths. 2. Backup current configuration. 3. Download and apply the appropriate patch for your product version. 4. Restart the service. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Restrict Admin Access

all

Temporarily limit administrative access to only essential personnel and review all admin accounts for suspicious activity.

Enhanced Monitoring

all

Implement additional monitoring for authentication configuration changes and alert on any modifications.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical assets
  • Enforce principle of least privilege by reviewing and reducing admin accounts to only those absolutely necessary

🔍 How to Verify

Check if Vulnerable:

Check your Ivanti product version against the affected versions listed in the vendor advisory.

Check Version:

Check via Ivanti web interface: System > Maintenance > About, or via CLI using product-specific commands

Verify Fix Applied:

After patching, verify the version number matches or exceeds the patched versions listed in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected authentication configuration changes
  • Admin account modifications by read-only users
  • Failed authentication attempts followed by configuration changes

Network Indicators:

  • Unusual authentication traffic patterns
  • Authentication requests to unexpected destinations

SIEM Query:

source="ivanti*" AND (event_type="config_change" OR event_type="auth_change") AND user_role="read_only_admin"

🔗 References

📤 Share & Export