CVE-2025-55143

6.1 MEDIUM

📋 TL;DR

This reflected text injection vulnerability in Ivanti secure access products allows unauthenticated attackers to inject arbitrary text into HTTP responses. Attackers can craft malicious links that, when clicked by users, display attacker-controlled content in the victim's browser. Affected systems include Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access before specific patched versions.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2, Policy Secure before 22.7R1.6, ZTA Gateway before 2.8R2.3-723, Neurons for Secure Access before 22.8R1.4
Operating Systems: All supported Ivanti appliance platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. User interaction is required (victim must click a crafted link).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts or phishing content that appears legitimate, potentially leading to credential theft, session hijacking, or malware distribution when users interact with crafted links.

🟠

Likely Case

Attackers create convincing phishing pages or inject misleading content that appears to come from legitimate Ivanti interfaces, tricking users into disclosing credentials or performing unintended actions.

🟢

If Mitigated

With proper input validation and output encoding, injected content would be properly sanitized and displayed as plain text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack is unauthenticated but requires user interaction. Attackers need to craft malicious URLs and trick users into clicking them.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2, Policy Secure 22.7R1.6, ZTA Gateway 2.8R2.3-723, Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US

Restart Required: No

Instructions:

1. Log into Ivanti admin portal. 2. Navigate to System > Maintenance > Software Updates. 3. Download and apply the appropriate patch for your product version. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules to filter suspicious input patterns in HTTP requests

Content Security Policy

all

Implement strict CSP headers to limit script execution from untrusted sources

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to Ivanti management interfaces
  • Deploy web application firewall with XSS protection rules in front of Ivanti appliances

🔍 How to Verify

Check if Vulnerable:

Check current version via admin interface: System > Maintenance > About, or SSH to appliance and run 'cat /etc/version'

Check Version:

ssh admin@ivanti-appliance 'cat /etc/version'

Verify Fix Applied:

Verify version matches or exceeds patched versions listed in advisory, then test with safe payloads to confirm sanitization

📡 Detection & Monitoring

Log Indicators:

  • Unusual long URLs with encoded characters in access logs
  • Multiple failed attempts with crafted parameters
  • Requests containing suspicious script-like patterns

Network Indicators:

  • HTTP requests with unusually long query parameters
  • Requests containing <script> tags or JavaScript patterns in URLs

SIEM Query:

source="ivanti_access_logs" AND (url="*%3Cscript*" OR url="*javascript:*" OR url_length>2000)

🔗 References

📤 Share & Export