CVE-2025-22457
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
4Tags
Description
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Analysis
Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow enabling unauthenticated remote code execution, the third major Ivanti VPN zero-day within fifteen months, exploited by UNC5221.
Technical Context
The CWE-121 stack overflow allows memory corruption through crafted requests. Mandiant attributed initial exploitation to UNC5221 with deployment of the TRAILBLAZE dropper and BRUSHFIRE backdoor.
Affected Products
['Ivanti Connect Secure before 22.7R2.6', 'Ivanti Policy Secure before 22.7R1.4', 'Ivanti ZTA Gateways before 22.8R2.2']
Remediation
Apply patches. Strongly consider migrating to alternative VPN solutions. Factory reset before patching. Run Ivanti Integrity Checker.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today