CVE-2025-55144

5.4 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in Ivanti secure access products that allows authenticated users with read-only admin privileges to modify restricted configuration settings. Attackers could potentially escalate privileges or alter security configurations. Organizations using affected Ivanti Connect Secure, Policy Secure, ZTA Gateway, or Neurons for Secure Access versions are vulnerable.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2, Policy Secure before 22.7R1.6, ZTA Gateway before 2.8R2.3-723, Neurons for Secure Access before 22.8R1.4
Operating Systems: All supported platforms for these products
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with read-only admin privileges. Fix was deployed on August 2, 2025.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with read-only admin access could reconfigure security settings, disable security controls, create backdoor accounts, or modify network routing to intercept sensitive traffic.

🟠

Likely Case

Malicious insiders or compromised accounts with read-only privileges could modify VPN configurations, change authentication settings, or alter access policies to bypass security controls.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized configuration changes would be detected and reverted before causing significant damage.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with read-only admin privileges. Attackers would need to understand the product's configuration interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2, Policy Secure 22.7R1.6, ZTA Gateway 2.8R2.3-723, Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US

Restart Required: No

Instructions:

1. Review the vendor advisory. 2. Download the appropriate patch for your product and version. 3. Apply the patch following Ivanti's documentation. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Restrict Admin Access

all

Temporarily limit administrative access to only essential personnel and review all admin accounts for necessity.

Enhanced Monitoring

all

Implement strict monitoring of configuration changes and alert on any modifications by read-only accounts.

🧯 If You Can't Patch

  • Implement strict access controls and review all admin accounts, ensuring read-only accounts cannot access configuration interfaces.
  • Enable detailed logging of all administrative actions and implement real-time alerting for configuration changes.

🔍 How to Verify

Check if Vulnerable:

Check your product version against affected versions listed in the advisory. Log into the admin interface and verify your current version.

Check Version:

Log into the product's administrative interface and navigate to System > Maintenance > Version Information (exact path may vary by product).

Verify Fix Applied:

After patching, verify the version number matches or exceeds the fixed versions. Test that read-only admin accounts can no longer modify restricted settings.

📡 Detection & Monitoring

Log Indicators:

  • Configuration changes made by read-only admin accounts
  • Unusual administrative activity patterns
  • Failed authorization attempts for privileged operations

Network Indicators:

  • Unusual administrative traffic patterns
  • Configuration changes during non-business hours

SIEM Query:

source="ivanti_secure_access" AND (event_type="configuration_change" AND user_role="read_only_admin")

🔗 References

📤 Share & Export