A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-0282
https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282
https://www.darkreading.com/endpoint-security/fixed-ivanti-bugs-japan-orgs-6-months-later
https://thehackernews.com/2025/07/ivanti-zero-days-exploited-to-drop.html
https://www.theregister.com/2025/04/25/more_ivanti_attacks_may_be/
https://thehackernews.com/2025/04/dslogdrat-malware-deployed-via-ivanti.html
https://therecord.media/cisa-ivanti-firewall-bug-exploitation
https://www.darkreading.com/vulnerabilities-threats/china-linked-threat-group-exploits-ivanti-bug
https://cyberscoop.com/china-espionage-group-ivanti-vulnerability-exploits/
https://www.theregister.com/2025/04/01/cisa_ivanti_warning/
https://www.securityweek.com/cisa-analyzes-malware-used-in-ivanti-connect-secure-zero-day-attacks/
https://www.darkreading.com/cyberattacks-data-breaches/cisa-warns-resurge-malware-ivanti-vuln
https://thehackernews.com/2025/03/resurge-malware-exploits-ivanti-flaw.html
https://www.cisa.gov/news-events/analysis-reports/ar25-087a
https://cyberscoop.com/silk-typhoon-targets-it-services/
https://www.theregister.com/2025/03/05/china_silk_typhoon_update/
https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/
https://www.infosecurity-magazine.com/news/silk-typhoon-exploits-common/
https://www.darkreading.com/remote-workforce/china-silk-typhoon-it-supply-chain-attacks
https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html
https://unit42.paloaltonetworks.com/threat-brief-ivanti-cve-2025-0282-cve-2025-0283/
https://www.darkreading.com/vulnerabilities-threats/critical-ivanti-rce-bug
https://www.securityweek.com/exploitation-of-new-ivanti-vpn-zero-day-linked-to-chinese-cyberspies/
https://therecord.media/china-espionage-ivanti-vulnerabilities-mandiant
https://www.securityweek.com/ivanti-warns-of-new-zero-day-attacks-hitting-connect-secure-product/
https://therecord.media/ivanti-warns-of-hackers-exploiting-new-vulnerability
https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day
Published: 2025-01-08
Updated: 2025-03-17
Known Exploited Vulnerability (KEV)
Base Score: 7.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 9
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity: Critical
EPSS: 0.93244
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest