CVE-2025-8712

5.4 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in Ivanti secure access products that allows authenticated users with read-only admin privileges to modify restricted configuration settings. This affects Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access. Attackers could potentially escalate privileges or alter security configurations.

💻 Affected Systems

Products:
  • Ivanti Connect Secure
  • Ivanti Policy Secure
  • Ivanti ZTA Gateway
  • Ivanti Neurons for Secure Access
Versions: Connect Secure before 22.7R2.9 or 22.8R2; Policy Secure before 22.7R1.6; ZTA Gateway before 22.8R2.3-723; Neurons for Secure Access before 22.8R1.4
Operating Systems: All supported platforms for affected Ivanti products
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with read-only admin privileges. Fix was deployed on August 2, 2025.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could reconfigure security settings, disable security controls, create backdoor accounts, or redirect traffic to malicious destinations, potentially leading to full system compromise.

🟠

Likely Case

Privilege escalation where read-only administrators gain write access to restricted settings, allowing them to modify configurations they shouldn't have access to.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, where unauthorized configuration changes are detected and rolled back quickly.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with admin privileges (even read-only). No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Connect Secure 22.7R2.9 or 22.8R2; Policy Secure 22.7R1.6; ZTA Gateway 22.8R2.3-723; Neurons for Secure Access 22.8R1.4

Vendor Advisory: https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs

Restart Required: No

Instructions:

1. Review the Ivanti security advisory. 2. Download the appropriate patch for your product version. 3. Apply the patch following Ivanti's documentation. 4. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit the number of users with admin privileges and review all admin accounts regularly.

Enhanced Monitoring

all

Implement strict monitoring of configuration changes and admin activity logs.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Ivanti appliances from critical systems
  • Enforce multi-factor authentication for all admin accounts and monitor for unusual configuration changes

🔍 How to Verify

Check if Vulnerable:

Check your Ivanti product version against the affected versions listed in the advisory.

Check Version:

Check via Ivanti web admin interface or CLI: show version

Verify Fix Applied:

Verify the product version shows the patched version after update and test that read-only admins cannot modify restricted settings.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes by read-only admin accounts
  • Admin privilege escalation attempts
  • Unusual configuration modifications outside change windows

Network Indicators:

  • Unexpected configuration changes to VPN or security settings
  • New admin accounts being created

SIEM Query:

source="ivanti*" AND (event_type="config_change" OR user_role="readonly_admin") AND action="modify"

🔗 References

📤 Share & Export