{"uuid": "c4a175b4-dfdf-4bd2-83a1-db67f7fb9aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "name": "Security Advisory Ivanti Connect Secure, Policy Secure & ZTA Gateways (CVE-2025-0282, CVE-2025-0283)", "description": "Created Date Jan 8, 2025 4:55:55 PM\nLast Modified Date Jan 8, 2025 6:00:09 PM\n\n# Summary\n\n[https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US](https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US)\n\nIvanti has released an update that addresses one critical and one high vulnerability in Ivanti Connect Secure, Policy Secure and ZTA Gateways. Successful exploitation of CVE-2025-0282 could lead to unauthenticated remote code execution. CVE-2025-0283 could allow a local authenticated attacker to escalate privileges.  \n\nA patch is available now, please refer to the table below for each affected product. \n\nWe are aware of a limited number of customers\u2019 Ivanti Connect Secure appliances being exploited by CVE-2025-0282 at the time of disclosure. We are not aware of these CVEs being exploited in Ivanti Policy Secure or ZTA gateways. \n\nWe are not aware of any exploitation of CVE-2025-0283 at the time of disclosure.   \n\nExploitation of CVE-2025-0282 can be identified by the Integrity Checker Tool (ICT).  We strongly advise all customers to closely monitor their internal and external ICT as a part of a robust and layered approach to cybersecurity to ensure the integrity and security of the entire network infrastructure.   \n\n\n# Vulnerability Details\n\n\n\nCVE Number \n\t\n\nDescription \n\t\n\nCVSS Score (Severity) \n\t\n\nCVSS Vector \n\t\n\nCWE \n\nCVE-2025-0282 \n\t\n\nA stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution. \n\t\n\n9.0 (Critical) \n\t\n\nCVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H \n\t\n\nCWE-121 \n\nCVE-2025-0283 \n\t\n\nA stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges. \n\t\n\n7.0 (High) \n\t\n\nCVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H \n\t\n\nCWE-121 \n\n\n", "creation_timestamp": "2025-01-08T18:43:09.190345+00:00", "timestamp": "2025-01-08T18:43:09.190345+00:00", "related_vulnerabilities": ["CVE-2025-0282", "CVE-2025-0283"], "author": {"login": "adulau", "name": "Alexandre Dulaunoy", "uuid": "c933734a-9be8-4142-889e-26e95c752803"}}
