Confirmed: Ivanti Zero-Day Attacks on Connect Secure Products

61 views 2 minutes read

Ivanti Zero-Day Attacks have once again brought cybersecurity to the forefront as the company disclosed critical vulnerabilities affecting its Connect Secure products.

These zero-day flaws, identified as CVE-2025-0282 and CVE-2025-0283, pose significant risks by enabling unauthorized remote code execution and privilege escalation.

With one of these vulnerabilities actively exploited in the wild, Ivanti urges immediate action from its users to safeguard their systems.

Key Takeaway to Ivanti Zero-Day Attacks:

  • Immediate action is essential to mitigate risks from vulnerabilities CVE-2025-0282 and CVE-2025-0283.

The Details Behind Ivanti Zero-Day Attacks

What Happened?

Ivanti, a prominent IT software vendor, recently issued a security advisory regarding two newly discovered vulnerabilities in its enterprise-facing products:

  • CVE-2025-0282: A critical stack-based buffer overflow with a CVSS score of 9.0, allowing remote code execution.
  • CVE-2025-0283: A high-severity vulnerability with a CVSS score of 7.0, enabling local attackers to escalate privileges.

The company confirmed active exploitation of CVE-2025-0282 and warned users to upgrade their systems immediately.

Affected Products

Product NameAffected VersionsResolved Versions
Ivanti Connect Secure22.7R2 through 22.7R2.422.7R2.5
Ivanti Policy Secure22.7R1 through 22.7R1.2Patch on Jan. 21
Ivanti Neurons for ZTA22.7R2 through 22.7R2.322.7R2.5

Affected Versions Table

CVEProduct NameAffected Version(s)Affected CPE(s)Resolved Version(s)Patch Availability
CVE-2025-0282Ivanti Connect Secure22.7R2 through 22.7R2.4cpe:2.3:a:ivanti:connect_secure:22.7:R2.4::::..22.7R2.5Download Portal
CVE-2025-0283Ivanti Connect Secure22.7R2.4 and prior, 9.1R18.9 and priorcpe:2.3:a:ivanti:connect_secure:22.7:R2.4::::..22.7R2.5Download Portal
CVE-2025-0282Ivanti Policy Secure22.7R1 through 22.7R1.2cpe:2.3:a:ivanti:policy_secure:22.7:r1.2::::.*.N/APatch planned availability Jan. 21
CVE-2025-0283Ivanti Policy Secure22.7R1.2 and priorcpe:2.3:a:ivanti:policy_secure:22.7:r1.2::::.*.N/APatch planned availability Jan. 21
CVE-2025-0282Ivanti Neurons for ZTA Gateways22.7R2 through 22.7R2.3N/A22.7R2.5Patch planned availability Jan. 21
CVE-2025-0283Ivanti Neurons for ZTA Gateways22.7R2.3 and priorN/A22.7R2.5Patch planned availability Jan. 21

This table summarizes the affected versions, corresponding CVEs, and patch details for the identified vulnerabilities in Ivanti products.

Recommended Actions

Ivanti has provided specific guidance to mitigate risks:

  • Upgrade to Safe Versions:
    • Users of Ivanti Connect Secure should immediately upgrade to version 22.7R2.5.
    • Ivanti Policy Secure patches are expected by January 21, 2025.
  • Use Integrity Checker Tool (ICT):
    • Perform an ICT scan to detect signs of compromise.
    • Conduct a factory reset if the scan shows any anomalies before applying patches.
  • Monitor Your Network:
    • Continuously monitor both internal and external ICT tools alongside other cybersecurity measures.
  • Avoid Internet Exposure:
    • Ivanti Policy Secure products should not be internet-facing as an added precaution.

Real-World Implications of Ivanti Zero-Day Attacks

The active exploitation of CVE-2025-0282 highlights the urgency of addressing zero-day vulnerabilities.

A similar incident occurred with the SolarWinds attack, where hackers exploited enterprise software to compromise government and private networks. These scenarios emphasize the critical need for proactive cybersecurity measures.

What This Means for the Future

The Ivanti Zero-Day Attacks underscore the increasing sophistication of cyber threats targeting enterprise software.

Experts predict an uptick in such vulnerabilities as attackers focus on exploiting critical infrastructure. Companies must prioritize regular updates, robust monitoring systems, and a layered approach to cybersecurity.

About Ivanti

Ivanti is a leading provider of IT management and cybersecurity solutions. Their focus is on enabling secure remote work, ensuring endpoint security, and automating IT tasks. For more details, visit Ivanti’s official website.

Rounding Up

The Ivanti Zero-Day Attacks highlight the constant battle between cybersecurity providers and malicious actors. With one of the vulnerabilities already exploited, users must act quickly to mitigate risks.

Updating software, monitoring network integrity, and following best practices are critical steps in protecting organizational data and infrastructure.

FAQs

What are Ivanti Zero-Day Attacks?

  • These are newly discovered vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure products that allow remote code execution and privilege escalation.

Which products are affected?

  • Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA Gateways.

How can I protect my system?

  • Upgrade to the latest versions as advised by Ivanti and monitor your network using the ICT tool.

Is there an immediate fix for all products?

  • A patch is available for Ivanti Connect Secure, while fixes for Ivanti Policy Secure are expected by January 21, 2025.

Where can I find more details?

0 comments

Sherrie Coppola March 27, 2025 - 4:46 pm Your comment is awaiting approval

What if cybersecuritycue.com could leverage TikTok for authentic leads? Our AI-powered growth service targets the perfect users—based on hashtags they use and people they watch—to supercharge your reach and send traffic back to you. We’ve had similar websites see 100+ new leads in a month.
Want to make TikTok work for cybersecuritycue.com? Test it out free for a week here: https://www.youtube.com/shorts/sfVup2NhPQ4

Reply

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2025 – All Right Reserved | Designed & Powered by VexaPlus Technologies

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More