Loading HuntDB...

CVE-2025-22457

CRITICAL
Published 2025-04-03T15:20:23.628Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-22457. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.0
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.265
probability
of exploitation in the wild

There is a 26.5% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.961
Higher than 96.1% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

Understanding This Vulnerability

This Common Vulnerabilities and Exposures (CVE) entry provides detailed information about a security vulnerability that has been publicly disclosed. CVEs are standardized identifiers assigned by MITRE Corporation to track and catalog security vulnerabilities across software and hardware products.

The severity rating (CRITICAL) indicates the potential impact of this vulnerability based on the CVSS (Common Vulnerability Scoring System) framework. Higher severity ratings typically indicate vulnerabilities that could lead to more significant security breaches if exploited. Security teams should prioritize remediation efforts based on severity, exploit availability, and the EPSS (Exploit Prediction Scoring System) score, which predicts the likelihood of exploitation in the wild.

If this vulnerability affects products or systems in your infrastructure, we recommend reviewing the affected products section, checking for available patches or updates from vendors, and implementing recommended workarounds or solutions until a permanent fix is available. Organizations should also monitor security advisories and threat intelligence feeds for updates about active exploitation of this vulnerability.

Available Exploits

Ivanti Connect Secure - Stack-based Buffer Overflow

Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 contain a stack-based buffer overflow caused by improper input handling, allowing remote attackers to execute arbitrary code without authentication.

ID: CVE-2025-22457
Author: s4e-iopussycat0x Critical

Related News

菴処

Ivanti Connect Secure⒢識эCVE-2025-22457鐚≪絵儀 (2025.04.04) a href="https://blogs.jpcert.or.jp/ja/2025/07/ivanti_cs.html">Ivanti Connect Secure㍽綣掩'儀鴻箴球㍂х∈茯ァ/a> (JPCERT/CC, 2025.07.18)

Ryukoku.ac.jp 2025-08-04 15:00
GreenboneOS: Attackers Advance on Two New Ivanti EPMM Flaws

Just last month, CVE-2025-22457 (CVSS 9.8) affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways was recognized as a vector for ransomware. Now, two new CVEs have been added to the growing list of high-risk Ivanti vulnerabilities; CVE-2025-4427 and…

Greenbone.net 2025-05-28 09:57
菴処

Ivanti Connect Secure⒢識эCVE-2025-22457鐚≪絵儀 (2025.04.04) f絵儀違紊у申荐 遵с茴㍂榊∈茯 Ivanti ZTA Gateways patch Ivanti Policy Secure patch 散2025.05.15 篋 翫сс若 (ICT) 茵パ㍾鴻箴腆肴 筝h箴球㍂綽純 PulseSecureァッ腟 (紊у, 2025.04.18) 紊ICT㍾承絎潟翫札筝絲…

Ryukoku.ac.jp 2025-04-29 15:00
Ivanti Zero-Day CVE-2025-22457 Exploit Details Released

Researchers at Rapid7 published technical details and proof-of-concept exploit code for a critical zero-day vulnerability in Ivanti Connect The post Ivanti Zero-Day CVE-2025-22457 Exploit Details Released appeared first on Daily CyberSecurity.

SecurityOnline.info 2025-04-11 03:28
Ivanti Products Remote Code Execution Vulnerability

A vulnerability has been identified in Ivanti Products. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. Note: CVE-2025-22457 is being exploited in the wild. A remote, unauthenticated attacker co…

Hkcert.org 2025-04-07 02:10

Affected Products

References

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

April 11, 2025

Added to KEV

April 4, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Ivanti
Product: Connect Secure, Policy Secure and ZTA Gateways

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.04.04 Released: April 4, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-jjr5-fpcg-gc53

Advisory Details

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: April 3, 2025, Modified: October 22, 2025

References

Published: 2025-04-03T15:20:23.628Z
Last Modified: 2025-07-28T19:42:01.217Z
Copied to clipboard!