9
CVSSv3

CVE-2025-22457

CVSSv4: NA | CVSSv3: 9 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.09862 | KEV: Exploitation Reported
Published: 03/04/2025 Updated: 03/04/2025

Vulnerability Summary

Remote Code Execution in Ivanti Connect Secure, Policy Secure, and ZTA Gateways

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated malicious user to achieve remote code execution.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ivanti connect secure

ivanti policy secure

ivanti neurons for zta gateways

Github Repositories

PoC for CVE-2025-22457 A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways Overview This is a proof of concept exploit to demonstrate exploitation of CVE-2025-22457 For a complete technical analysis of the vulnerability and exploitation strategy, please see our Rapid7 Analysis here:

CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCE

CVE-2025-22457-PoC CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCE CVE-2025-22457 A stack-based buffer overflow in Ivanti Connect Secure allows a remote unauthenticated attacker to achieve remote code execution PoC for achieving RCE in Ivanti Connect Secure Appliances PoC is both in Python and a metasploit module (more advanced payload for meterpreter)

CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE

CVE-2025-22457 CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE

Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN

ivantiunlocker Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN

Recent Articles

Ivanti patches Connect Secure zero-day exploited since mid-March
BleepingComputer • Sergiu Gatlan • 03 Apr 2025

Ivanti patches Connect Secure zero-day exploited since mid-March By Sergiu Gatlan April 3, 2025 01:43 PM 0 Ivanti has released security updates to patch a critical Connect Secure remote code execution vulnerability exploited by a China-linked espionage actor to deploy malware since at least mid-March 2025. Tracked as CVE-2025-22457, this critical security flaw is due to a stack-based buffer overflow weakness. It impacts Pulse Connect Secure 9.1x (which reached end-of-support in December), Ivanti...

Suspected Chinese spies right now hijacking buggy Ivanti gear – for third time in 3 years
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Simple denial-of-service blunder turned out to be remote unauth code exec disaster

Suspected Chinese government spies have been exploiting a newly disclosed critical bug in Ivanti VPN appliances since mid-March. This is now at least the third time in three years these snoops have been pwning these products. Plus, post-exploit, the Beijing-backed crew deployed on compromised Ivanti equipment two new malware strains along with variants of the Spawn software nasty, we're told. Ivanti today detailed the under-attack 9.0-out-of-10-severity vulnerability, tracked as CVE-2025-22457, ...