Ivanti Connect Secure & Policy Secure Flaws Expose Systems to DoS Attacks

Ivanti has released a critical security advisory addressing several medium-severity vulnerabilities in its flagship products, Ivanti Connect Secure (ICS) and Ivanti Policy Secure (IPS).

The vulnerabilities, identified by multiple CVEs, affect versions of ICS before 22.7R2.8 and IPS before 22.7R1.5.

According to Ivanti, there is no evidence of active exploitation in the wild at the time of disclosure.

Administrators are strongly urged to update to the latest versions—ICS 22.7R2.8 and IPS 22.7R1.5—available through the official Ivanti download portal.

The fixes are not backported to legacy 9.x versions, which have reached end-of-support as of December 31, 2024.

Vulnerabilities and Impact

The advisory details six distinct vulnerabilities, each with unique technical characteristics and potential impact:

CVE NumberDescriptionCVSS ScoreCWE
CVE-2025-5450Improper access control in certificate management; allows read-only admins to modify restricted settings.6.3CWE-602
CVE-2025-5451Stack-based buffer overflow; enables denial of service by remote authenticated admins.4.9CWE-121
CVE-2025-5463Insertion of sensitive info into logs; local attackers may access confidential data.5.5CWE-532
CVE-2025-5464Similar log file info leak, specific to ICS.6.5CWE-532
CVE-2025-0293CLRF injection; allows remote admin to write to protected config files.6.6CWE-93
CVE-2025-0292Server-Side Request Forgery (SSRF); remote admin can access internal network services.5.5CWE-918

Technical Terms Explained:

  • CVE (Common Vulnerabilities and Exposures): Standardized identifier for publicly known cybersecurity vulnerabilities.
  • CWE (Common Weakness Enumeration): Categorizes software weaknesses, such as CWE-121 (Stack-based Buffer Overflow).
  • CVSS (Common Vulnerability Scoring System): Rates the severity of vulnerabilities; scores here range from 4.9 to 6.6 (medium).

Example of CVSS Vector (for CVE-2025-5450):

textCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

This indicates a network attack vector, low attack complexity, and limited impact on confidentiality, integrity, and availability.

Patch Guidance and Product Lifecycle

Affected Versions:

  • Ivanti Connect Secure: 22.7R2.7 and prior
  • Ivanti Policy Secure: 22.7R1.4 and prior

Resolved Versions:

  • ICS: 22.7R2.8
  • IPS: 22.7R1.5

Customers are strongly encouraged to upgrade to the latest supported versions to maintain protection against these vulnerabilities.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here