Ivanti has disclosed a critical vulnerability, CVE-2025-22457, affecting its Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways products that are actively exploited in the wild.
This stack-based buffer overflow flaw, with a CVSS score of 9.0, has been actively exploited since mid-March 2025, posing significant risks to organizations using these VPN and network access solutions.
CVE-2025-22457 is a stack-based buffer overflow (CWE-121) that allows a remote, unauthenticated attacker to achieve remote code execution (RCE).
The flaw arises from improper input validation, enabling attackers to overflow the buffer and execute arbitrary code.
“This advisory has been updated to make it clear the vulnerability was fully patched in Ivanti Connect Secure” Ivanti Said.
Ivanti disclosed the vulnerability on April 3, 2025, but Mandiant reports exploitation by UNC5221, a suspected Chinese state-sponsored group, since mid-March. UNC5221, known for targeting edge devices, has previously exploited Ivanti zero-days like CVE-2023-46805.
Attackers use CVE-2025-22457 to deploy malware such as Trailblaze (an in-memory dropper), Brushfire (a passive backdoor), and the Spawn suite for credential theft and lateral movement. Post-exploitation, they tamper with logs using tools like SPAWNSLOTH to evade detection.
The vulnerability was patched in Ivanti Connect Secure version 22.7R2.6 on February 11, 2025, initially considered a low-risk denial-of-service issue due to its limited character set (periods and numbers).
However, UNC5221 likely reverse-engineered the patch, developing an RCE exploit for unpatched systems, escalating its severity.
Ivanti confirmed that a limited number of customers running Ivanti Connect Secure (22.7R2.5 or earlier) and Pulse Connect Secure 9.1x appliances were compromised. Details include:
Ivanti recommends monitoring the Integrity Checker Tool (ICT) for signs of compromise, such as web server crashes. If detected, a factory reset and upgrade to 22.7R2.6 are advised. Mandiant’s blog provides additional indicators of compromise. A post on X by
@nekono_naha on April 4, 2025, noted that of 12,471 exposed Ivanti/Pulse Connect Secure servers, 66% (8,246) are vulnerable, with 50% (6,049) on pre-9.x versions, highlighting the urgency of patching.
This incident marks Ivanti’s 15th appearance in CISA’s Known Exploited Vulnerabilities catalog since 2024, signaling systemic security challenges with its edge devices.
UNC5221’s involvement underscores the geopolitical stakes, as China-linked actors increasingly target infrastructure for espionage. The delayed disclosure despite the February patch reveals gaps in vulnerability management.
Initially underestimated as a low-risk issue, the flaw’s exploitability allowed attackers a month-long window before public disclosure, emphasizing the need for faster threat intelligence sharing.
Organizations should act swiftly:
The exploitation of CVE-2025-22457 highlights the persistent threats to network edge devices. As state-sponsored actors like UNC5221 target such vulnerabilities, organizations must prioritize timely patching and secure deployment.
Ivanti’s response addresses supported versions, but legacy systems remain a challenge, underscoring the need for robust cybersecurity practices in an evolving threat landscape.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates
A 13-year-old critical remote code execution (RCE) vulnerability in Redis, dubbed RediShell, allows attackers to…
Paris, France, October 6th, 2025, CyberNewsWire Reemo continues its mission to secure enterprise remote access…
A threat actor has claimed responsibility for a significant data breach at Huawei Technologies, a…
Doctors Imaging Group, a healthcare provider based in Florida, has reported a significant data breach…
Forensic-Timeliner, a Windows forensic tool for DFIR investigators, has released version 2.2, which offers enhanced…
NCSC has issued an urgent warning regarding a critical zero-day flaw in Oracle E-Business Suite…