WARNING: Critical Ivanti Vulnerability Actively Exploited
Organizations are urged to act immediately to mitigate vulnerabilities in Ivanti Connect Secure, Policy Secure, and ZTA Gateways (CVE-2025-0282 and CVE-2025-0283) by following the latest guidance from Ivanti.
What Happened?
Ivanti has disclosed two stack-based buffer overflow vulnerabilities affecting the following products:
Details of Vulnerabilities:
Affected Versions: These vulnerabilities exist in versions prior to:
Exploitation Status
Ivanti has reported active exploitation of CVE-2025-0282 targeting Ivanti Connect Secure. .
Who is Affected?
Organizations using Ivanti Connect Secure, Policy Secure, or Neurons for ZTA Gateways are at risk.
Recommended Actions
To mitigate these vulnerabilities, follow these priority steps:
By taking these actions promptly, organizations can reduce the risk of exploitation and strengthen the security of their environments.
It is worth noting the company emphasized that the Ivanti Policy Secure product is not designed to be exposed directly to the internet, which considerably reduces the risk of exploitation. A fix for the Ivanti Policy Secure product is scheduled for release on January 21, 2025.
OK Boštjan Dolinšek
Architect | Advisory Council Member, Passionate Privileged Access Management Security Professional
7moHaving to do a factory reset adds another "pucker layer."
Sales Director
7moHow was the vulnerability exposed ??
International Ambassador at Zafehouze - making IT, OT and IoT 'Zafe' | "If you think the problem can't be solved by technology, then you probably don't understand the technology" | CCNA | CCDA | Checkpoint | RSA
7moAt least they are divulging this information up front unlike last time. Any people affected should be looking at advancing their security with proactive solutions like Zafepass. Search for it and get in touch.