CVE-2025-55145

8.9 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to hijack existing HTML5 connections in Ivanti secure access products. It affects organizations using Ivanti Connect Secure, Policy Secure, ZTA Gateway, or Neurons for Secure Access with vulnerable versions. Attackers can potentially take over active user sessions.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2, Policy Secure before 22.7R1.6, ZTA Gateway before 2.8R2.3-723, Neurons for Secure Access before 22.8R1.4
Default Config Vulnerable: ⚠️ Yes
Notes: Fix was deployed on August 2, 2025. All configurations with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could hijack administrative sessions, gain full control of the Ivanti appliance, pivot to internal networks, and compromise sensitive data.

🟠

Likely Case

Attackers hijack user sessions to access internal resources, steal credentials, or perform lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to session hijacking within the Ivanti environment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but could be chained with other vulnerabilities. HTML5 session hijacking suggests manipulation of web socket connections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2, Policy Secure 22.7R1.6, ZTA Gateway 2.8R2.3-723, Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch following Ivanti documentation. 4. Restart the appliance. 5. Verify version and functionality.

🔧 Temporary Workarounds

Restrict Access Controls

all

Limit network access to Ivanti appliances to trusted IP ranges only

Session Timeout Reduction

all

Reduce HTML5 session timeout values to minimize hijacking window

🧯 If You Can't Patch

  • Isolate Ivanti appliances in a dedicated network segment with strict firewall rules
  • Implement multi-factor authentication for all user accounts and monitor for suspicious session activity

🔍 How to Verify

Check if Vulnerable:

Check the appliance version in the Ivanti admin interface under System > Maintenance > Version Information

Check Version:

ssh admin@ivanti-appliance 'show version' or check web admin interface

Verify Fix Applied:

Verify version matches patched versions listed in the advisory and test HTML5 connectivity

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTML5 sessions from same user/IP
  • Session ID reuse anomalies
  • Unexpected connection terminations

Network Indicators:

  • Abnormal WebSocket traffic patterns
  • Multiple connections to same HTML5 port from different sources

SIEM Query:

source="ivanti*" AND (event="session_hijack" OR event="connection_anomaly")

🔗 References

📤 Share & Export