Loading HuntDB...

CVE-2025-22457

CRITICAL
Published 2025-04-03T15:20:23.628Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-22457. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.0
/10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.265
probability
of exploitation in the wild

There is a 26.5% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.961
Higher than 96.1% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

Available Exploits

Ivanti Connect Secure - Stack-based Buffer Overflow

Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 contain a stack-based buffer overflow caused by improper input handling, allowing remote attackers to execute arbitrary code without authentication.

ID: CVE-2025-22457
Author: s4e-io Critical

Related News

菴処

Ivanti Connect Secure⒢識эCVE-2025-22457鐚≪絵儀 (2025.04.04) a href="https://blogs.jpcert.or.jp/ja/2025/07/ivanti_cs.html">Ivanti Connect Secure㍽綣掩'儀鴻箴球㍂х∈茯ァ/a> (JPCERT/CC, 2025.07.18)

Ryukoku.ac.jp 2025-08-04 15:00
GreenboneOS: Attackers Advance on Two New Ivanti EPMM Flaws

Just last month, CVE-2025-22457 (CVSS 9.8) affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways was recognized as a vector for ransomware. Now, two new CVEs have been added to the growing list of high-risk Ivanti vulnerabilities; CVE-2025-4427 and…

Greenbone.net 2025-05-28 09:57
菴処

Ivanti Connect Secure⒢識эCVE-2025-22457鐚≪絵儀 (2025.04.04) f絵儀違紊у申荐 遵с茴㍂榊∈茯 Ivanti ZTA Gateways patch Ivanti Policy Secure patch 散2025.05.15 篋 翫сс若 (ICT) 茵パ㍾鴻箴腆肴 筝h箴球㍂綽純 PulseSecureァッ腟 (紊у, 2025.04.18) 紊ICT㍾承絎潟翫札筝絲…

Ryukoku.ac.jp 2025-04-29 15:00
Ivanti Zero-Day CVE-2025-22457 Exploit Details Released

Researchers at Rapid7 published technical details and proof-of-concept exploit code for a critical zero-day vulnerability in Ivanti Connect The post Ivanti Zero-Day CVE-2025-22457 Exploit Details Released appeared first on Daily CyberSecurity.

SecurityOnline.info 2025-04-11 03:28
Ivanti Products Remote Code Execution Vulnerability

A vulnerability has been identified in Ivanti Products. A remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. Note: CVE-2025-22457 is being exploited in the wild. A remote, unauthenticated attacker co…

Hkcert.org 2025-04-07 02:10

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

April 11, 2025

Added to KEV

April 4, 2025

Required Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Affected Product

Vendor/Project: Ivanti
Product: Connect Secure, Policy Secure and ZTA Gateways

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.04.04 Released: April 4, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-jjr5-fpcg-gc53

Advisory Details

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: April 3, 2025, Modified: April 3, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

2 posts
Reddit 2 weeks, 1 day ago
ContentByrkRahul
Exploit

Best VPNs for Multiple Devices The digital security landscape has reached a critical inflection point. **More than 50% of IoT devices currently have exploitable vulnerabilities**, while VPN-related security incidents have surged by 82.5% since 2020. With the average household now managing 25+ connected devices—from smartphones and laptops to smart TVs, …

1
1.0
View Original High Risk
Reddit 2 months ago
Sarunas

Sofistikuota interneto ataka - pažeidžiamumai ICS įrenginiuose Saugumo tyrėjai aptiko naują kenkėjišką programą **MDifyLoader**, išnaudojančią CVE-2025-0282 ir CVE-2025-22457 spragas Ivanti Connect Secure įrenginiuose. JPCERT/CC ataskaita parodo, kad atakos vyko nuo gruodžio 2024 iki liepos. Skaitom: [https://thehackernews.com/2025/07/ivanti-zero-days-exploited-to-drop.html](https://thehackernews.com/2025/07/ivanti-zero-days-exploited-to-drop.html)

Also mentions: CVE-2025-0282

References

Published: 2025-04-03T15:20:23.628Z
Last Modified: 2025-07-28T19:42:01.217Z
Copied to clipboard!