Ivanti Connect Secure Flaw Exploited by Hackers, Patch Now

The cybersecurity landscape is facing another critical threat as Ivanti recently disclosed the CVE-2025-22457 vulnerability affecting several of its products. This vulnerability, actively exploited since mid-March 2025, presents significant risks to organizations relying on Ivanti’s VPN and network access solutions. With a CVSS score of 9.0, it’s imperative for businesses to act swiftly to mitigate potential damages.

Severity of the Vulnerability

Critical Vulnerability Details

Ivanti Connect Secure, alongside other affected products, suffers from a stack-based buffer overflow flaw categorized under CWE-121. This flaw permits remote and unauthenticated attackers to execute arbitrary code, leading to remote code execution (RCE). The root cause is identified as improper input validation, allowing buffer overflow and malicious code execution. This type of vulnerability is particularly dangerous because it can be exploited without user interaction, making it easier for attackers to compromise systems.

The exposure stems from versions of Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways. The vulnerability exists in Ivanti Connect Secure versions 22.7R2.5 and earlier, Pulse Connect Secure versions 9.1R18.9 and prior, Ivanti Policy Secure versions 22.7R1.3 and prior, and ZTA Gateways versions 22.8R2 and prior. This flaw allows remote and unauthenticated attackers to execute arbitrary code on targeted systems.

Affected Versions and Initial Patch

The vulnerability impacts Ivanti Connect Secure versions 22.7R2.5 and earlier, Pulse Connect Secure versions 9.1R18.9 and prior, Ivanti Policy Secure versions 22.7R1.3 and prior, and ZTA Gateways versions 22.8R2 and prior. Ivanti released a patch in February 2025, initially deeming the risk lower due to character set limitations but later recognized its potential for RCE. While the initial patch aimed to address the vulnerability by limiting the character set involved, subsequent exploitation revealed gaps in coverage, necessitating a more comprehensive approach.

The incomplete nature of the initial patch provided a window of opportunity for attackers to reverse-engineer the fix and leverage the vulnerability for sophisticated exploitations. This period of vulnerability emphasized the need for organizations to promptly apply patches and to maintain vigilance against emerging threats. Organizations should continue to scrutinize their network security measures and adopt quick response protocols to mitigate potential exploitation.

Exploitation by UNC5221

Exploitation Tactics and Techniques

Exploitation efforts by UNC5221 have been sophisticated, involving tools such as Trailblaze, Brushfire, and the Spawn suite used for credential theft and lateral network movement. Attackers utilized SPAWNSLOTH to tamper logs, complicating detection efforts. The incomplete coverage by the initial patch created a vulnerable period for systems during early 2025. This group, suspected to be Chinese state-sponsored, has a history of targeting edge devices and exploiting vulnerabilities like CVE-2023-46805.

UNC5221’s approach includes deploying in-memory droppers (Trailblaze), passive backdoors (Brushfire), and tools from the Spawn suite, which facilitate credential theft and lateral movements within compromised networks. The use of SPAWNSLOTH to tamper logs further complicates detection measures, allowing attackers to remain undetected for extended periods. As exploitation techniques evolve, it highlights the need for robust detection methods and vigilant monitoring of network activities.

UNC5221 Group Profile

Known for targeting edge devices and exploiting Ivanti zero-days, UNC5221’s activities underscore the urgency of robust cybersecurity practices. Their association with state-sponsored groups highlights geopolitical risks and sophisticated exploitation techniques. This state-sponsored entity has progressively refined its exploitation methods, rendering traditional security measures insufficient. The group’s capability to manipulate network edge devices poses systemic security challenges, urging enterprises to bolster defenses and to adopt proactive cybersecurity strategies.

UNC5221’s repertoire includes a wide range of tools designed for stealth, persistence, and data exfiltration. The group’s focus on edge devices signifies an elevated risk for organizations, especially those relying on legacy systems. The coordinated exploitation efforts draw attention to the imperative for timely patch applications and continuous security assessments.

Patching and Recommendations

Urgent Patch Requirements

Ivanti has provided patches and recommendations, urging users to upgrade to Ivanti Connect Secure version 22.7R2.6 and leverage migration support for Pulse Connect Secure customers. Ivanti Policy Secure and ZTA Gateways received patches with upcoming auto-apply dates. Customers running Ivanti Connect Secure (22.7R2.5 or earlier) and Pulse Connect Secure 9.1x appliances should take immediate action to apply the patches. The company’s prompt response to issuing patches underscores the critical nature of the vulnerability.

For Pulse Connect Secure users, contacting Ivanti for migration support is vital as the product is no longer supported after December 2024. Ivanti Policy Secure and ZTA Gateways users should ensure their systems are updated as patches become available. Given the stakes involved, organizations must perform factory resets if systems are found compromised and redeploy utilizing upgraded versions.

Steps for Mitigation

Organizations must use the Integrity Checker Tool for detecting unusual activities and compromised systems. Performing factory resets and limiting exposure for Ivanti Policy Secure and ZTA Gateways are crucial steps. Enhanced monitoring and staying updated through Ivanti and Mandiant advisories are vital in thwarting potential breaches. Utilizing the Integrity Checker Tool can help detect signs of exploitation, such as web server crashes or unauthorized outbound connections.

Further, organizations must ensure that Ivanti Policy Secure and ZTA Gateways are not internet-facing, reducing the risk of exploitation. By following Ivanti’s security advisories, businesses can stay informed about emerging threats and apply security measures promptly. Additionally, robust monitoring can help identify unusual activities and prevent exploitation from escalating.

Overarching Trends and Implications

Importance of Timely Patching

The recurring theme in this incident is the critical importance of timely patching and vigilant cybersecurity practices. Ivanti’s multiple vulnerability disclosures necessitate robust defenses and fast response actions from organizations. The involvement of sophisticated state-sponsored groups requires elevated awareness and collaboration to combat emerging cyber threats. Timely patch applications can mitigate the risk posed by unpatched systems and reduce the likelihood of successful exploitations.

As organizations increasingly face geopolitical threats, the need for robust cybersecurity measures intensifies. The recurring exploitation by state-backed entities underscores the necessity for adaptive security frameworks and continuous investments in cybersecurity technologies. By fostering collaboration between vendors and security practitioners, enterprises can enhance their resilience against evolving threats.

Legacy Systems Challenges

The cybersecurity landscape faces a new and significant threat as Ivanti recently revealed the CVE-2025-22457 vulnerability affecting multiple products. This vulnerability, which has been actively exploited since mid-March 2025, poses serious risks to organizations that depend on Ivanti’s VPN and network access solutions. With a CVSS score of 9.0, this flaw represents a severe security risk, illustrating how formidable the threat is. Businesses must act quickly to mitigate potential damage and safeguard their critical systems and information. With cybersecurity being paramount, the revelation of this vulnerability underscores the importance of regular updates and monitoring of security protocols. Companies need to deploy patches and enhance their security measures promptly to avert any potential exploitation risks. As cyber threats evolve rapidly, Ivanti’s disclosure highlights the necessity for relentless vigilance and swift response strategies in the cybersecurity domain to protect sensitive organizational data and maintain operational integrity.

subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address
subscription-bg
Subscribe to Our Weekly News Digest

Stay up-to-date with the latest security news delivered weekly to your inbox.

Invalid Email Address