Monday, April 28, 2025
HomeCVE/vulnerabilityIvanti 0-Day RCE Flaw Exploitation Details Revealed

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

Published on

SIEM as a Service

Follow Us on Google News

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across the cybersecurity industry.

The flaw, which affects several Ivanti products, allows attackers to execute arbitrary code remotely, potentially compromising sensitive enterprise environments.

Researchers, including the Rapid7 vulnerability team, have provided a detailed breakdown of how the flaw was exploited and what steps are needed for remediation.

- Advertisement - Google News

Vulnerability Overview

The flaw resides in Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways due to a stack-based buffer overflow vulnerability in the HTTPS web server.

Ivanti initially classified the issue as a minor bug and silently patched it in February 2025 without a proper security release or advisory. However, a sophisticated China-based threat actor reverse-engineered this patch to build a working exploit.

The vulnerability lies in the HTTPS web server binary /home/bin/web, specifically within the WebRequest::dispatchRequest function.

This function processes HTTP headers, including the X-Forwarded-For header, without proper length checks. An attacker can overflow a fixed 50-character buffer on the stack by supplying a manipulated header value exceeding this size.

char *current_header_value = ctx->header_value_array[header_index];

size_t sz = strspn(current_header_value, "01234567890.");

char buff50[50];

strlcpy(buff50, current_header_value, sz + 1); // Vulnerable code snippet

Here, the lack of length validation results in arbitrary stack overwrites, enabling RCE after gaining control over program execution.

Technical Details

  • Component Affected: The vulnerability lies in the /home/bin/web binary, specifically in WebRequest::dispatchRequest when processing HTTP headers.
  • Exploitation Details: Attackers manipulate the X-Forwarded-For header to overflow the fixed buffer on the stack. However, exploitation is challenging as the overflow is restricted to certain characters (0123456789.).
  • Heap Spraying: Attackers use heap spraying techniques to control memory locations that allow arbitrary execution despite the Address Space Layout Randomization (ASLR) security mechanism.

Proof of Concept (PoC)

Within four business days, Rapid7 researchers developed a fully functional exploit that leverages Return-Oriented Programming (ROP) techniques.

An example of the PoC running in test setup
An example of the PoC running in test setup

Using gadgets from shared libraries, such as libdsplibs, attackers achieve a stack pivot and eventually execute arbitrary commands. The PoC implementation is public, highlighting the risk to unpatched systems.

Affected Systems

Products impacted by CVE-2025-22457 include:

  1. Ivanti Connect Secure: Versions prior to 22.7R2.6.
  2. Pulse Connect Secure: End-of-Life (EoL); customers must migrate to supported versions of Ivanti Connect Secure.
  3. Ivanti Policy Secure: Versions prior to 22.7R1.4 (scheduled patch on April 21, 2025).
  4. ZTA Gateways: Versions prior to 22.8R2.2 (scheduled patch on April 19, 2025).

The flaw has already been exploited in the wild, reportedly by state-linked operations. The China-based group performed reconnaissance and exploitation targeting high-value enterprise systems.

Attackers relied on brute-forcing ASLR to execute their payloads, causing frequent web server crashes.

Mitigations and Remediation

Ivanti has provided patches for some affected systems, with remaining updates scheduled later this month. Users are advised to:

  1. Update Systems Immediately:
    • Ivanti Connect Secure: Patch to version 22.7R2.6 released February 11, 2025.
    • ZTA Gateways: Patch available April 19, 2025.
    • Ivanti Policy Secure: Patch expected April 21, 2025.
  2. Migrate Legacy Products: Pulse Connect Secure is no longer supported; migrate to Ivanti Connect Secure.
  3. Implement Network Segmentation: Isolate and monitor Ivanti appliances.
  4. Audit Logs: Regularly review logs for suspicious behavior such as unexplained crashes.

The delayed disclosure of CVE-2025-22457 has led to criticism over Ivanti’s patching policies.

Experts emphasize the growing danger of state-sponsored actors reverse-engineering “silent patches” and exploiting overlooked vulnerabilities.

Cybersecurity professionals agree this incident reaffirms the importance of timely vulnerability disclosure and robust processes for assessing edge-device risks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client...

Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems

Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client...