CVE-2025-55147

8.8 HIGH

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in multiple Ivanti security products that allows an unauthenticated remote attacker to trick authenticated users into performing sensitive actions without their knowledge. Attackers can exploit this by luring victims to malicious websites while logged into affected Ivanti systems. Organizations using vulnerable versions of Ivanti Connect Secure, Policy Secure, ZTA Gateway, or Neurons for Secure Access are affected.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2, Policy Secure before 22.7R1.6, ZTA Gateway before 2.8R2.3-723, Neurons for Secure Access before 22.8R1.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. User interaction is required (victim must visit malicious site while authenticated).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could perform administrative actions like creating new privileged accounts, changing configurations, or accessing sensitive data through authenticated user sessions, potentially leading to full system compromise.

🟠

Likely Case

Attackers trick users into performing unauthorized actions such as changing passwords, modifying access policies, or leaking session information, leading to privilege escalation or data exposure.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts would fail or be detected, limiting impact to isolated incidents.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CSRF attacks are generally low complexity. Exploitation requires social engineering to lure authenticated users to malicious sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2, Policy Secure 22.7R1.6, ZTA Gateway 2.8R2.3-723, Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US

Restart Required: Yes

Instructions:

1. Download appropriate patch from Ivanti support portal. 2. Backup current configuration. 3. Apply patch following Ivanti documentation. 4. Restart affected services. 5. Verify patch installation.

🔧 Temporary Workarounds

CSRF Token Implementation

all

Implement anti-CSRF tokens in web application forms if not already present

SameSite Cookie Attribute

all

Configure session cookies with SameSite=Strict or SameSite=Lax attributes

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect CSRF patterns
  • Educate users about phishing risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check product version via web admin interface or CLI. Compare against affected versions listed in advisory.

Check Version:

ssh admin@<device-ip> show version

Verify Fix Applied:

Verify installed version matches or exceeds patched versions. Test CSRF protection by attempting to submit forms without valid tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from same IP
  • Unexpected configuration changes by non-admin users
  • Sensitive actions performed without proper authentication logs

Network Indicators:

  • Requests missing CSRF tokens
  • Cross-origin requests to sensitive endpoints
  • Suspicious referrer headers

SIEM Query:

source="ivanti*" AND (action="config_change" OR action="user_create") AND user_agent="*" | stats count by src_ip, user

🔗 References

📤 Share & Export