Ivanti Connect Secure, Policy Secure, and ZTA Gateways Affected by Multiple Security Flaws

Ivanti has issued a September security advisory addressing eleven vulnerabilities in its Secure Access portfolio—Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access.

The flaws include six medium-severity and five high-severity issues, none of which are known to have been exploited in the wild at the time of disclosure.

Administrators are urged to apply available patches or mitigations immediately to safeguard remote access infrastructure.

High-Risk Authorization Bypass and CSRF Flaws

Among the most critical issues are multiple authorization bypass and cross-site request forgery (CSRF) vulnerabilities.

Four authorization bypass flaws (CVE-2025-55145, CVE-2025-55141, CVE-2025-55142, CVE-2025-55148) allow authenticated users with read-only or limited privileges to modify restricted or authentication-related settings, potentially enabling privilege escalation or persistent access.

CSRF weaknesses (CVE-2025-55111 and CVE-2025-55147) permit unauthenticated attackers to coerce victims into executing sensitive actions with minimal user interaction.

With CVSS scores reaching 8.9 and 8.8, these vulnerabilities pose a significant risk to organizations that expose management interfaces directly to the internet.

Denial of Service, SSRF, and Injection Issues

Ivanti also patched a denial-of-service flaw (CVE-2025-55146) exploitable by high-privilege attackers to crash services, and a server-side request forgery (SSRF) issue (CVE-2025-55139) enabling enumeration of internal infrastructure.

A reflected text injection bug (CVE-2025-55143) allows attackers to inject arbitrary content into HTTP responses when victims interact with crafted URLs.

Though rated medium-severity, these defects can facilitate broader attacks or reconnaissance against protected networks.

Affected Products and Versions

Product NameAffected Version(s)Resolved Version(s)Patch Availability
Ivanti Connect Secure22.7R2.8 and prior22.7R2.9 or 22.8R2Download via Ivanti Portal
Ivanti Policy Secure22.7R1.4 and prior22.7R1.5Download via Ivanti Portal
ZTA Gateways22.8R2.222.8R2.3-723Available in controller since August 2, 2025
Neurons for Secure Access22.8R1.3 and prior22.8R1.4Fix applied to cloud environments on August 2, 2025

Ivanti strongly recommends that customers update affected systems to the patched versions listed above.

For Neurons for Secure Access in cloud environments, no additional action is required.

As a mitigation, organizations should ensure administrative portals are not publicly accessible—limiting exposure aligns with Ivanti’s best practices and reduces risk for CVE-2025-8712, CVE-2025-55148, CVE-2025-55139, CVE-2025-55141, CVE-2025-55142, and CVE-2025-55144.

Ivanti thanks security researcher Nikolay Semov for reporting CVE-2025-55145 and collaborating on this advisory.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here