Thursday, April 24, 2025
HomeCVE/vulnerabilityIvanti 0-Day Vulnerability Exploited in Wild-Patch Now

Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now

Published on

SIEM as a Service

Follow Us on Google News

Ivanti released a critical security advisory addressing vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateways products.

This advisory reveals the existence of two significant vulnerabilities, CVE-2025-0282 and CVE-2025-0283, which have been exploited in the wild, necessitating immediate action from users.

Critical Vulnerability: CVE-2025-0282

CVE-2025-0282 is a stack-based buffer overflow vulnerability that affects Ivanti Connect Secure versions prior to 22.7R2.5, Ivanti Policy Secure before 22.7R1.2, and Ivanti Neurons for ZTA gateways before 22.7R2.3.

- Advertisement - Google News

This vulnerability allows an unauthenticated remote attacker to execute arbitrary code, posing a severe security risk. It has received a CVSS score of 9.0, categorizing it as a critical vulnerability.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

High Severity Vulnerability: CVE-2025-0283

The second vulnerability, CVE-2025-0283, similarly affects the same versions of Ivanti’s products but permits a local authenticated attacker to escalate privileges.

This vulnerability has a CVSS score of 7.0, indicating a high severity level. While CVE-2025-0282 has been confirmed as exploited in the wild, there is currently no evidence that CVE-2025-0283 has been abused.

Ivanti emphasizes the need for all customers to promptly apply the available patches to mitigate the risks posed by these vulnerabilities.

For those using Ivanti Connect Secure, upgrading to version 22.7R2.5 is critical. The patch is now available for download through the Ivanti portal.

Users should also conduct thorough scans using the Integrity Checker Tool (ICT) to identify any signs of compromise.

Affected Versions and Patch Availability

CVEProduct NameAffected Version(s)Resolved Version(s)Patch Availability
CVE-2025-0282Ivanti Connect Secure22.7R2 through 22.7R2.422.7R2.5Available Now
CVE-2025-0283Ivanti Connect Secure22.7R2.4 and prior22.7R2.5Available Now

Organizations utilizing Ivanti products must act swiftly to safeguard their networks against these vulnerabilities.

Upgrading and continuous monitoring of the ICT are key components of a robust cybersecurity strategy.

As exploits become increasingly sophisticated, staying informed and proactive is essential to maintaining the integrity of network infrastructures.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...