Understanding the Critical Threat to Ivanti Connect Secure Devices
More than 5,113 Ivanti Connect Secure VPN appliances are currently unpatched and at high risk, susceptible to the critical CVE-2025-22457 vulnerability—a severe stack-based buffer overflow that facilitates unauthorized remote code execution (RCE).
Global Impact of the Vulnerability
The most recent scans by The Shadowserver Foundation have exposed a vast number of devices affected globally, including major countries like the United States, Japan, China, and Australia. This vulnerability is not just theoretical; it has been actively exploited by what are believed to be nation-state actors, aiming to compromise data and infrastructures.
Detailed Insights into the CVE-2025-22457 Exploit
The CVE-2025-22457 flaw presents a critical threat, scoring 9.0 on the CVSS scale, and impacts various Ivanti products:
- Ivanti Connect Secure (versions 22.7R2.5 and prior)
- Pulse Connect Secure (9.1R18.9 and prior)
- Ivanti Policy Secure (22.7R1.3 and prior)
- ZTA Gateways (22.8R2 and prior)
This flaw allows remote attackers to execute arbitrary code on affected devices without user interaction, making it a critical target for immediate remediation efforts.
Timeline and Discoveries
Initially patched as a non-exploitable bug in February 2025, further investigation revealed its potential for exploitation. Active attacks began surfacing as early as mid-March 2025, confirming the vulnerability’s severe impact and exploitability.
Advanced Malware Identified in Exploitation Activities
Mandiant security researchers have traced the exploitation activities to UNC5221, a suspected threat actor group. They discovered the deployment of two sophisticated malware types:
- TRAILBLAZE: An initial stage memory dropper.
- BRUSHFIRE: A passive backdoor for sustained access and espionage.
These tools significantly enhance the attackers’ capabilities to extract valuable information undetected.
Urgent Mitigation and Protection Measures
Following the alarming spread and exploitation of this vulnerability, CISA has emphasized the urgency of updating to the latest patches released by Ivanti. They specifically urge the application of Ivanti Connect Secure 22.7R2.6, along with conducting thorough system audits using Ivanti’s tools.
- Immediate patch application
- Factory resets for compromised devices
- Revocation and reissue of certificates, keys, and passwords if compromise is detected
Failure to promptly address these recommendations can lead to continued unauthorized access and potential breaches, underlining the necessity for swift and decisive action.
Amid these developments, the Shadowserver Foundation’s findings pinpoint many organizations that remain unprotected, underscoring the critical need for these entities to prioritize their cybersecurity measures immediately.
Related: CISA Warns of CrushFTP Authentication Bypass Vulnerability Exploited in Attacks
Last Updated: April 9, 2025