HomeCyber BalkansVulnerability in Ivanti Connect Secure Exploited

Vulnerability in Ivanti Connect Secure Exploited

Published on

spot_img

Ivanti, a leading cybersecurity company, recently disclosed a critical security flaw in its Connect Secure appliances, identified as CVE-2025-22457. This vulnerability, stemming from a stack-based buffer overflow, allows malicious actors to remotely execute arbitrary code without authentication. The affected versions include Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways prior to specific patch releases. Initially dismissed as a minor product bug, the severity of this vulnerability became apparent when it was exploited in the wild, impacting numerous customers.

The issue was initially addressed in February 2025 with the release of Ivanti Connect Secure version 22.7R2.6, but evidence of exploitation emerged in mid-March 2025. Cybersecurity firm Mandiant, a subsidiary of Google, identified a threat actor known as UNC5221, linked to China, leveraging the vulnerability to deploy sophisticated malware such as the TRAILBLAZE in-memory dropper and the BRUSHFIRE backdoor.

UNC5221 is well-known for exploiting zero-day vulnerabilities in Ivanti products, making this incident the first documented exploitation of such a vulnerability in Ivanti’s offerings. The attack involves sophisticated, multi-stage scripts that deploy malware directly into memory, evading traditional detection methods. The use of the SPAWN malware suite enables credential theft and potential data exfiltration, with Mandiant researchers tracing the group’s activities back to previous exploits of Ivanti devices and other edge network devices.

To further obfuscate their actions, the threat group operates through an obfuscation network, complicating efforts to attribute attacks and implement effective countermeasures. In response to these developments, Ivanti stresses the urgency of updating to the patched version of Connect Secure (22.7R2.6) promptly to address the vulnerability. While patches for Ivanti Policy Secure and ZTA Gateways are still in progress, they are expected to be released by mid-April 2025.

Additionally, Ivanti recommends utilizing its Integrity Checker Tool to monitor for any signs of compromise and initiating a factory reset if necessary. This incident underscores the escalating threat posed by persistent and sophisticated cyber actors targeting critical infrastructure on a global scale.

As cybersecurity threats continue to evolve and become more pervasive, proactive measures such as timely software updates and vigilant monitoring play a crucial role in safeguarding against potential breaches. It is imperative for organizations to stay informed about emerging vulnerabilities and take prompt action to protect their systems and data from malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...