Saturday, April 26, 2025
HomeCVE/vulnerabilityOver 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Over 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Over 5,000 Ivanti Connect Secure devices remain vulnerable to a critical remote code execution (RCE) flaw, according to data from the Shadowserver Foundation.

The vulnerability, tracked as CVE-2025-22457, stems from a stack-based buffer overflow issue, enabling unauthenticated attackers to execute arbitrary code remotely.

The flaw has already been exploited in the wild, raising alarms across the global cybersecurity community.

- Advertisement - Google News

Exploitation in the Wild

The Shadowserver Foundation revealed in a report published on April 6, 2025, that their scans had detected precisely 5,113 vulnerable Ivanti Connect Secure devices that had not yet been patched.

The severity of this vulnerability has placed it on the CISA Known Exploited Vulnerabilities (KEV) catalog, underscoring the urgent need for organizations to act.

According to Shadowserver, this RCE flaw allows attackers to gain full control over affected devices without requiring authentication.

This makes the vulnerability particularly dangerous, as threat actors could leverage it for activities such as data exfiltration, launching ransomware campaigns, or creating backdoors for persistent access.

Global Distribution of Vulnerable Devices

The Shadowserver Foundation’s interactive map highlights the geographic distribution of vulnerable devices. The exposure is widespread, with affected systems detected in both IPv4 and IPv6 spaces.

High concentrations of unpatched devices were observed in regions of North America, Europe, and Asia.

Organizations relying on Ivanti Connect Secure devices to manage their secure access infrastructure are advised to investigate their networks immediately.

Ivanti first disclosed CVE-2025-22457 in early March 2025, alongside the release of security updates to address the issue.

However, the latest findings indicate that a significant portion of devices remains unpatched, leaving critical infrastructure at risk.

Security experts strongly advise system administrators to implement the patches provided by Ivanti as a top priority.

In addition to applying the fix, organizations are encouraged to conduct comprehensive reviews of their access logs to identify any signs of compromise.

The continued existence of unpatched Ivanti Connect Secure devices highlights the ongoing challenge of timely patching in enterprise environments.

The lack of updates not only endangers the organizations using these devices but also presents risks to the broader digital ecosystem as attackers increasingly weaponize known vulnerabilities.

Cybersecurity professionals emphasize that attackers are likely scanning for and exploiting this vulnerability in unpatched systems.

Organizations that fail to take immediate action may face severe consequences, including data breaches, service disruptions, and potential legal liabilities.

As the threat landscape continues to evolve, this incident serves as a stark reminder of the importance of prioritizing patch management and maintaining robust cybersecurity hygiene.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

How to Develop a Strong Security Culture – Advice for CISOs and CSOs

Developing a strong security culture is one of the most critical responsibilities for today’s...

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...