BSI: Zero-Day Attacks on Ivanti Connect Secure

B2B Cyber ​​Security ShortNews
Advertising

Share post

The BSI warns: There are critical vulnerabilities in Ivanti products Connect Secure (ICS), Policy Secure and ZTA Gateway. The manufacturer has published a corresponding security advisory. This includes a critical vulnerability with a CVSS score of 9.0 out of 10.

At the beginning of January 2025, the manufacturer Ivanti published an advisory on critical vulnerabilities in its products Ivanti Connect Secure (ICS), Policy Secure and ZTA Gateway. The security vulnerability CVE-2025-0282 is particularly serious, allowing an unauthenticated, remote attacker to execute arbitrary code on the affected systems. This vulnerability is classified as "critical" with a CVSS score of 9.0 and warns of a stack-based buffer overflow (CWE-121).

Advertising

Affected Ivanti product versions

  • Ivanti Connect Secure: Version 22.7R2 up to and including 22.7R2.4
  • Ivanti Policy Secure: Version 22.7R1 up to and including 22.7R1.2
  • Ivanti Neurons for ZTA Gateways: Version 22.7R2 up to and including 22.7R2.3

According to Ivanti, targeted attacks on a limited number of ICS customers have already been observed. The IT security company Mandiant reports the first compromises since mid-December 2024. In addition, the vulnerability CVE-2025-0283 with a CVSS score of 7.0 ("high") was identified, which could be exploited by a locally authenticated attacker to escalate privileges. However, there is no evidence of active exploitation of this second vulnerability so far.

BSI's situation assessment

The Federal Office for Information Security (BSI) also warns: VPN solutions such as Ivanti Connect Secure serve as central entry points into internal networks and are therefore often the target of cyber attacks. Although only isolated attacks have been detected so far, the severity of the CVE-2025-0282 vulnerability means that it can be expected to be exploited on a large scale in the short term. The attacks observed indicate a professional group of perpetrators who use sophisticated techniques to conceal their activities. The Federal Office for Information Security (BSI) therefore classifies the current IT threat situation as "business critical" (level 3 / orange).

Advertising

The BSI calls on IT security managers to take the following steps immediately:

compromise check

Responsible parties should use the Integrity Checker Tool (ICT) provided by Ivanti to identify signs of exploitation of CVE-2025-0282. Reset appliances: Even if scan results are normal, Ivanti recommends preemptively resetting affected appliances to factory defaults to remove potential backdoors. Carefully monitor all internal and external systems for any abnormalities that could indicate a compromise.

Updating Ivanti Connect Secure to the hardened version 22.7R2.5, which fixes the critical vulnerability.

  • According to Ivanti, patches for Ivanti Policy Secure and Ivanti Neurons for ZTA Gateways will be available starting January 21, 2025.
More at BSI.Bund.de

 


About the Federal Office for Information Security (BSI)

The Federal Office for Information Security (BSI) is the federal cyber security authority and the creator of secure digitization in Germany. The guiding principle: As the federal cyber security authority, the BSI designs information security in digitization through prevention, detection and reaction for the state, economy and society.


 

Matching articles on the topic

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Healthcare facilities: 90 percent are at high risk

The current report “State of CPS Security: Healthcare Exposures 2025” shows the most dangerous vulnerabilities of medical devices in networks of ➡ Read more