CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild
2025-1-8 19:16:44 Author: www.tenable.com(查看原文) 阅读量:28 收藏


January 8, 2025

4 Min Read


A blue gradient background with the Tenable Research logo in the top center. Underneath it is an orange rectangular box with the word "ADVISORY" in it. Underneath this box are the words: Zero-Day Vulnerability Exploited In The Wild. This is a blog about a new zero-day vulnerability in Ivanti Connect Secure that was exploited in the wild.

Ivanti disclosed two vulnerabilities in its Connect Secure, Policy Secure and Neurons for ZTA gateway devices, including one flaw that was exploited in the wild as a zero-day.

Background

On January 8, Ivanti published a security advisory for two vulnerabilities affecting multiple products including Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for Zero Trust Access (ZTA) gateways:

CVEDescriptionCVSSv3
CVE-2025-0282Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for ZTA gateways Stack-based Buffer Overflow Vulnerability9.0
CVE-2025-0283Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for ZTA gateways Stack-based Buffer Overflow Vulnerability7.0

Analysis

CVE-2025-0282 is a stack-based buffer overflow vulnerability in Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for ZTA gateways. An unauthenticated, remote attacker that successfully exploits this flaw would obtain remote code execution on a vulnerable device.

CVE-2025-0283 is also a stack-based buffer overflow in Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Neurons for ZTA gateways. Unlike CVE-2025-0282, a local, authenticated attacker that successfully exploits this flaw would be able to elevate privileges on a vulnerable device.

In-the-wild exploitation observed for CVE-2025-0282

In a blog post, Ivanti confirmed that they have observed in-the-wild exploitation of CVE-2025-0282 in “a limited number of customers” of Ivanti Connect Secure devices. They reiterate that they have not observed exploitation against Ivanti Policy Secure or Neurons for ZTA gateways.

Historical exploitation of Ivanti Connect Secure

Ivanti Connect Secure, formerly known as Pulse Connect Secure, has been frequently targeted by attackers of all types, including advanced persistent threat (APT) groups as well as ransomware affiliates and opportunistic cybercriminals.

CVEDescriptionTenable PublicationsYear
CVE-2019-11510Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability1, 2, 3, 4, 52019
CVE-2019-11539Ivanti Pulse Connect Secure and Policy Secure Command Injection Vulnerability1, 2, 3, 42019
CVE-2020-8218Ivanti Pulse Connect Secure Code Injection VulnerabilityTenable 2020 Threat Landscape Retrospective2020
CVE-2020-8243Ivanti Pulse Connect Secure Code Injection Vulnerability1, 22020
CVE-2020-8260Ivanti Pulse Connect Secure Unrestricted File Upload Vulnerability1, 22020
CVE-2021-22893Ivanti Pulse Connect Secure Authentication Bypass Vulnerability1, 22021
CVE-2021-22894Ivanti Pulse Connect Secure Buffer Overflow VulnerabilityCVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild2021
CVE-2021-22899Ivanti Pulse Connect Secure Command Injection VulnerabilityCVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild2021
CVE-2021-22900Ivanti Pulse Connect Secure Multiple Unrestricted Uploads VulnerabilityCVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild2021
CVE-2023-46805Ivanti Connect Secure and Ivanti Policy Secure Authentication Bypass Vulnerability1, 22024
CVE-2024-21887Ivanti Connect Secure and Ivanti Policy Secure Command Injection Vulnerability1, 22024
CVE-2024-21893Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) VulnerabilityCVE-2023-46805, CVE-2024-21887, CVE-2024-21888 and CVE-2024-21893: Frequently Asked Questions for Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways2024

Because of the historical exploitation of these devices, customers are strongly advised to apply the available patch for these flaws as soon as possible.

Proof of concept

At the time this blog post was published, there were no public proof-of-concept exploits for CVE-2025-0282 or CVE-2025-0283.

Solution

Ivanti has released the following patches for Connect Secure, Policy Secure and Neurons for ZTA Gateways.

Affected ProductAffected Versions (CVE-2025-0282)Affected Versions (CVE-2025-0283)Fixed Version
Ivanti Connect Secure22.7R2 through 22.7R2.422.7R2.4 and below
9.1R18.9 and below
22.7R2.5
Ivanti Policy Secure22.7R1 through 22.7R1.222.7R1.2 and belowUnavailable until January 21
Ivanti Neurons for ZTA gateways22.7R2 through 22.7R2.322.7R2.3 and below22.7R2.5 (Unavailable until January 21)

Ivanti customers can utilize its Integrity Checker Tool (ICT) to identify exploitation of CVE-2025-0282.

For Connect Secure customers, Ivanti recommends performing a factory reset of devices prior to upgrading to version 22.7R2.5 “out of an abundance of caution” for those with clean ICT scan results and to “ensure any malware is removed” where ICT results “show signs of compromise.”

Identifying affected systems

A list of Tenable plugins for these vulnerabilities can be found on the individual CVE pages for CVE-2025-0282 and CVE-2025-0283 as they’re released. These links will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.

Tenable Attack Surface Management customers are able to quickly identify these assets by leveraging the built in subscription labeled Ivanti Connect Secure (ICS) - v1.

A screenshot of the Tenable Attack Surface Management user interface showing the Subscriptions section and highlighting the Ivanti Connect Secure (ICS) - v1" subscription that can be used to identify devices.

Get more information

Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Satnam Narang

Satnam Narang

Satnam joined Tenable in 2018. He has over 15 years experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder. He's appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.

Interests outside of work: Satnam writes poetry and makes hip-hop music. He enjoys live music, spending time with his three nieces, football and basketball, Bollywood movies and music and Grogu (Baby Yoda).

  • Exposure Management

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


文章来源: https://www.tenable.com/blog/cve-2025-0282-ivanti-connect-secure-zero-day-vulnerability-exploited-in-the-wild
如有侵权请联系:admin#unsafe.sh