icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Ivanti Connect Secure Vulnerability Allows Remote Code Execution

Summary:
Ivanti released an advisory detailing multiple vulnerabilities affecting its Connect Secure, Policy Secure, and Secure Access Client products. Some of the flaws allow for RCE and unauthorized data access. The vulnerabilities range from medium to critical severity and impact various versions of Ivanti products. The highest-scoring vulnerability from this security advisory is CVE-2025-22467 with a CVSS score of 9.9. CVE-2025-22467 is a critical stack-based buffer overflow vulnerability in Ivanti Connect Secure that grants the adversary the ability to execute arbitrary code on affected systems. Another critical vulnerability, CVE-2024-38657 (CVSS 9.1), enables an attacker with admin privileges to write arbitrary files, potentially compromising system integrity. Other vulnerabilities include code injection flaws (CVE-2024-10644, CVSS 9.1), arbitrary file read vulnerabilities (CVE-2024-12058), reflected cross-site scripting (XSS) vulnerabilities (CVE-2024-13830), and issues related to hardcoded keys and cleartext storage of sensitive information (CVE-2024-13842, CVE-2024-13843). Ivanti has addressed these vulnerabilities in the latest versions of their products:
  • Ivanti Connect Secure 22.7R2.6
  • Ivanti Policy Secure 22.7R1.3
  • Ivanti Secure Access Client 22.8R1
Security Officer Comments:
The recent disclosure of multiple vulnerabilities in Ivanti's Connect Secure, Policy Secure, and Secure Access Client products is a significant security event that demands immediate attention. Ivanti Connect Secure is a well-known SSL VPN solution used by many organizations. Therefore, these flaws are incentivized targets for exploitation by threat actors to gain complete control of a system. Remote code execution vulnerabilities grant the attacker a slew of capabilities, underscoring the severity of these Ivanti vulnerabilities. CVE-2025-22467 allows an authenticated remote attacker to execute arbitrary code. While authentication is required, the potential for exploitation remains high, especially in environments where compromised credentials or weak authentication mechanisms are present. Ivanti's prompt release of patches is commendable. However, the window of vulnerability between disclosure and patching is a critical period. Organizations using these Ivanti products must prioritize patching their systems immediately. The potential for widespread impact necessitates a swift and decisive response from all affected organizations.

Suggested Corrections:
Customers are advised to update to these versions as soon as possible. The company provides access to the updated software through its download portal (login required). While Ivanti is not currently aware of any active exploitation of these vulnerabilities, the potential impact underscores the urgency of applying the available updates.

Link(s):
https://securityonline.info/cve-2025-22467-cvss-9-9-ivanti-connect-secure-vulnerability-allows-remote-code-execution/