Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways


Ivanti on September 9 released a security advisory detailing six medium and five high severity vulnerabilities impacting Ivanti Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access.

No evidence of customer exploitation has surfaced so far. Patches and fixes are available immediately to address issues ranging from missing authorization checks and cross-site request forgery (CSRF) flaws to server-side request forgery (SSRF) and denial-of-service conditions.

Scope of Vulnerabilities

The advisory covers multiple components, including on-premise and cloud products.

Affected versions include Ivanti Connect Secure 22.7R2.8 and earlier, Policy Secure 22.7R1.4 and earlier, ZTA Gateways 22.8R2.2, and Neurons for Secure Access 22.8R1.3 and earlier.

Ivanti deployed fixes on August 2, 2025, for all products; cloud environments for Neurons for Secure Access were updated automatically.

CVE NumberDescriptionCVSS ScoreSeverity
CVE-2025-8712Missing authorization allows remote authenticated read-only admin to change restricted settings.5.4Medium
CVE-2025-8711CSRF enables remote unauthenticated attacker to perform limited actions with victim interaction.5.4Medium
CVE-2025-55145Missing authorization allows remote authenticated attacker to hijack existing HTML5 connections.8.9High
CVE-2025-55146Unchecked return value enables remote authenticated admin to trigger denial of service.4.9Medium
CVE-2025-55147CSRF permits remote unauthenticated attacker to execute sensitive actions with user interaction.8.8High
CVE-2025-55148Missing authorization allows remote authenticated read-only admin to configure restricted settings.7.6High
CVE-2025-55139SSRF lets remote authenticated admin enumerate internal services.6.8Medium
CVE-2025-55141Missing authorization permits remote authenticated read-only admin to configure authentication.8.8High
CVE-2025-55142Missing authorization permits remote authenticated read-only admin to configure authentication.8.8High
CVE-2025-55143Reflected text injection allows remote unauthenticated attacker to inject arbitrary HTTP response.6.1Medium
CVE-2025-55144Missing authorization enables remote authenticated read-only admin to configure restricted settings.5.4Medium

Mitigation and Recommendations

Patch Deployment:

  • Ivanti Connect Secure: Update to 22.7R2.9 or 22.8R2 via the Ivanti download portal.
  • Ivanti Policy Secure: Upgrade to 22.7R1.5 from the portal.
  • ZTA Gateways: Download version 22.8R2.3-723 from the controller interface.
  • Neurons for Secure Access: No customer action required; fixes auto-applied in cloud on August 2.

Customers should avoid exposing administrative portals directly to the internet. Restricting access via network controls aligns with Ivanti’s security guidance and industry best practices.

Ivanti thanks security researcher Nikolay Semov for reporting CVE-2025-55145. For details on Ivanti’s Vulnerability Disclosure Policy, visit the Ivanti support page.

Ensuring software components are up to date is critical. Administrators are urged to apply these patches immediately to maintain the integrity and security of remote access and zero-trust gateway deployments.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.



Source link