PT-2025-14768 · Ivanti · Ivanti Connect Secure +2
Published
2025-04-03
·
Updated
2025-07-15
·
CVE-2025-22457
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Ivanti Connect Secure versions 22.7R2.5 and earlier
Ivanti Policy Secure versions 22.7R1.4 and earlier
Ivanti ZTA Gateways versions 22.8R2.2 and earlier
**Description:**
A stack-based buffer overflow vulnerability exists in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This vulnerability allows a remote, unauthenticated attacker to achieve remote code execution. The vulnerability was initially misdiagnosed as a low-risk issue but has been actively exploited by UNC5221, a suspected China-nexus threat actor, since mid-March 2025. Exploitation involves the use of malware families including TRAILBLAZE, BRUSHFIRE, and SPAWN. Over 5,000 Ivanti Connect Secure appliances are estimated to be vulnerable.
The vulnerability is triggered by manipulating the `X-Forwarded-For` header, leading to a buffer overflow in the HTTP(S) web server component.
**Recommendations:**
Ivanti Connect Secure versions prior to 22.7R2.6
Ivanti Policy Secure versions prior to 22.7R1.4
Ivanti ZTA Gateways versions prior to 22.8R2.2
Exploit
Fix
RCE
DoS
Memory Corruption
Stack Overflow
Related Identifiers
Affected Products
References · 262
- 🔥 https://github.com/sfewer-r7/CVE-2025-22457⭐ 58 🔗 13 · Exploit
- 🔥 https://github.com/securekomodo/CVE-2025-22457⭐ 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-22457 · Security Note
- https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-03788 · Security Note
- https://twitter.com/transilienceai/status/1910484246508298460 · Twitter Post
- https://twitter.com/_r_netsec/status/1908157128914948357 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1908133595526361241 · Twitter Post
- https://t.me/c/1519182536/17893 · Telegram Post
- https://twitter.com/nexsecura/status/1908841677558575565 · Twitter Post
- https://twitter.com/de_do20/status/1912522022896173470 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1907857270601375987 · Twitter Post
- https://twitter.com/kautoh/status/1910577184588120394 · Twitter Post
- https://t.me/c/2147616733/467 · Telegram Post
- https://twitter.com/livenewsalert/status/1907802099594764455 · Twitter Post