CVE-2025-8310

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers to reset administrator passwords in Ivanti Virtual Application Delivery Controller (vADC) admin consoles, potentially gaining full administrative control. It affects organizations running vADC versions before 22.9. Attackers need existing authenticated access to exploit this flaw.

💻 Affected Systems

Products:
  • Ivanti Virtual Application Delivery Controller (formerly vTM)
Versions: All versions before 22.9
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin console interface; requires authenticated access but not necessarily administrative privileges initially.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the vADC appliance, allowing attackers to reconfigure network traffic, intercept sensitive data, deploy malware, or pivot to internal networks.

🟠

Likely Case

Privilege escalation where authenticated users (including low-privilege accounts) gain administrative access to modify configurations, disrupt services, or access sensitive information.

🟢

If Mitigated

Limited impact if strong network segmentation, multi-factor authentication, and least-privilege access controls prevent unauthorized users from reaching the admin console.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the admin console; attackers may use stolen credentials or existing low-privilege accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.9 or later

Vendor Advisory: https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Virtual-Application-Delivery-Controller-vADC-previously-vTM-CVE-2025-8310?language=en_US

Restart Required: No

Instructions:

1. Download vADC version 22.9 or later from Ivanti support portal. 2. Apply the update through the admin console or CLI. 3. Verify the update completes successfully without service disruption.

🔧 Temporary Workarounds

Restrict Admin Console Access

all

Limit network access to the admin console using firewall rules or network segmentation to only trusted IP addresses.

Enforce Strong Authentication

all

Implement multi-factor authentication (MFA) for all admin console users and review/remove unnecessary accounts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vADC admin consoles from untrusted networks.
  • Enable detailed logging and monitoring for admin console access and password reset attempts.

🔍 How to Verify

Check if Vulnerable:

Check the vADC version in the admin console under System > About or via CLI command 'show version'.

Check Version:

show version

Verify Fix Applied:

Confirm the version is 22.9 or higher and test that password reset functionality requires proper authorization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin password reset events
  • Failed authentication attempts followed by successful resets
  • Login from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to password reset endpoints from unauthorized sources

SIEM Query:

source="vADC" AND (event_type="password_reset" OR uri="/admin/password/reset")

🔗 References

📤 Share & Export