CISA Alerts on Critical Ivanti Connect Exploit in VPN Systems

Article Highlights
Off On

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised an alarm on a newly identified critical vulnerability in Ivanti Connect Secure, a popular VPN solution.This alarming issue, recorded as CVE-2025-22457, has swiftly found its way into the Known Exploited Vulnerabilities (KEV) Catalog. Since mid-March of the current year, this vulnerability has been actively exploited, enabling remote and unauthenticated attackers to execute arbitrary code.This state of affairs brings a significant risk to organizations relying on these VPN solutions to secure their networks.

Vulnerability Details

CVE-2025-22457 is a formidable security concern featuring a stack-based buffer overflow (CWE-121), carrying a high CVSS score of 9.0. This severity rating underscores the critical nature of this vulnerability, as it allows attackers to execute code remotely without any need for authentication. The scope of impact is extensive, affecting several versions of Ivanti products including Ivanti Connect Secure (versions 22.7R2.5 and earlier), Pulse Connect Secure (versions 9.1R18.9 and earlier), Ivanti Policy Secure (versions 22.7R1.3 and prior), and ZTA Gateways (versions 22.8R2 and prior).Patch availability was announced in February for Ivanti Connect Secure with version 22.7R2.6. However, patches for other affected products, including Ivanti Policy Secure and ZTA Gateways, are set to roll out by April 21 and April 19, respectively. This timing highlights the critical need for organizations using these products to prioritize updates and mitigate potential risks associated with this vulnerability.When a vulnerability with a CVSS score of 9.0 surfaces, immediate attention is necessary. The stack-based buffer overflow nature of CVE-2025-22457 puts sensitive data and critical infrastructure at risk of being compromised by malicious actors.This vulnerability’s exploitation could have wide-reaching repercussions for organizations that fail to update their systems promptly.

Active Exploitation

The inclusion of CVE-2025-22457 in the CISA KEV Catalog on April 4, 2025, underscores the significance of this vulnerability’s active exploitation. Reports indicate that exploitation began in mid-March, likely prompted by the actions of UNC5221. This group, notorious for targeting edge devices, has deployed malware varieties such as Trailblaze and Brushfire, threatening persistent access and valuable data theft.

UNC5221’s tactic involves reverse-engineering security patches, a method allowing them to exploit vulnerabilities promptly.This points to a crucial lesson for all organizations: the urgency of patching systems as soon as updates become available. The timely action can prevent potential breaches and safeguard crucial data.

With the availability of CISA’s KEV Catalog in various formats (CSV, JSON, print), cybersecurity professionals have a vital resource for identifying vulnerabilities exploited in the wild.CVE-2025-22457’s addition to this catalog highlights its substantial risk, urging organizations to expedite their mitigation measures. CISA has set an April 11, 2025, deadline for these actions, alongside its BOD 22-01 guidance, which offers comprehensive strategies for enhancing vulnerability management in cloud services.

Recommended Actions

Organizations are advised to initiate threat hunting activities using Ivanti’s Integrity Checker Tool (ICT). This involves detecting signs of compromise such as web server crashes. Conducting thorough threat hunts on connected systems ensures that potential risks are identified and mitigated before causing significant damage.

In cases where no compromise is detected, it is recommended to conduct a factory reset using a clean image for cloud or virtual systems while applying the necessary patches as per Ivanti’s advisory.Monitoring authentication services and auditing privileged accounts are crucial steps to ensure the ongoing security of the system. In some cases, temporarily disconnecting vulnerable devices until patches are applied might be a prudent move.

When compromise is confirmed, immediate isolation of affected devices is necessary. This should be followed by taking forensic images or coordinating with Ivanti for further analysis.A factory reset with a clean image helps in re-securing the system. Additionally, revoking and reissuing certificates, keys, and passwords, including admin and API credentials, and resetting domain account passwords twice, are essential actions. Disabling cloud-joined devices, applying the relevant patches, and reporting the incident to CISA and Ivanti constitute a comprehensive response plan.

Conclusion: Urgent Measures in Cybersecurity

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has sounded an urgent alarm regarding a newly found critical vulnerability in Ivanti Connect Secure, a widely used VPN solution. This serious flaw, designated as CVE-2025-22457, has been promptly added to the Known Exploited Vulnerabilities (KEV) Catalog.Since March of this year, this vulnerability has been actively targeted by malicious actors, who are using it to execute arbitrary code without the need for authentication. This situation presents a substantial threat to organizations that depend on these VPN solutions to protect their networks. Organizations must immediately take action to mitigate this threat, patch affected systems, and review their security measures to avoid potential breaches. By addressing this critical flaw, businesses can reduce the risk of severe cybersecurity incidents that could compromise sensitive data. With cyber threats evolving rapidly, it is crucial for organizations to stay vigilant and keep their defenses updated.

Explore more

Wix and ActiveCampaign Team Up to Boost Business Engagement

In an era where businesses are seeking efficient digital solutions, the partnership between Wix and ActiveCampaign marks a pivotal moment for enhancing customer engagement. As online commerce evolves, enterprises require robust tools to manage interactions across diverse geographical locations. This alliance combines Wix’s industry-leading website creation and management capabilities with ActiveCampaign’s sophisticated marketing automation platform, promising a comprehensive solution to

Can Coal Plants Power Data Centers With Green Energy Storage?

In the quest to power data centers sustainably, an intriguing concept has emerged: retrofitting coal plants for renewable energy storage. As data centers grapple with skyrocketing energy demands and the imperative to pivot toward green solutions, this innovative idea is gaining traction. The concept revolves around transforming retired coal power facilities into thermal energy storage sites, enabling them to harness

Can AI Transform Business Operations Successfully?

Artificial intelligence (AI) has emerged as a foundational technology poised to revolutionize the structure and efficiency of business operations across industries. With the ability to automate tasks, predict outcomes, and derive insights from vast datasets, AI presents an opportunity for transformative change. Yet, despite its promise, successfully integrating AI into business operations remains a complex undertaking for many organizations. Businesses

Is PayPal Revolutionizing College Sports Payments?

PayPal has made a groundbreaking entry into collegiate sports by securing substantial agreements with the NCAA’s Big Ten and Big 12 conferences, paving the way for student-athletes to receive compensation via its platform. This move marks a significant evolution in PayPal’s strategy to position itself as a leading financial services provider under CEO Alex Criss. With a monumental $100 million

Zayo Expands Fiber Network to Meet Rising Data Demand

The increasing reliance on digital communications and data-driven technologies, such as artificial intelligence, remote work, and ongoing digital transformation, has placed unprecedented demands on the fiber infrastructure industry. Projections indicate a need for nearly 200 million additional fiber-network miles by 2030 to prevent bandwidth shortages, putting pressure on companies like Zayo. As a prominent provider in the telecom infrastructure sector,