A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.
https://thehackernews.com/2025/04/critical-ivanti-flaw-actively-exploited.html
https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/
https://www.bleepingcomputer.com/news/security/ivanti-fixes-three-critical-flaws-in-connect-secure-and-policy-secure/
https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html
https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs
Source: Mitre, NVD
Published: 2025-02-11
Updated: 2025-02-20
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.03098