25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Patch Warning: Critical Ivanti Connect Secure Zero-day Exploited

Ivanti has released patches for two Connect Secure vulnerabilities including a critical zero-day remote code execution vulnerability that is being actively exploited in the wild to install malware. The first instances of exploitation are believed to have occurred in mid-December. The vulnerability was identified by Ivanti after the Ivanti Integrity Checker Tool (ICT) revealed the presence of malware on users’ appliances. The malware was installed after a threat actor exploited a previously unknown remote code execution flaw, which is being tracked as CVE-2025-0282 and has a CVSS severity score of 9.0.

The critical stack buffer overflow flaw affects all Ivanti Connect Secure (Pulse Secure) VPN appliances running versions 22.7R2 through 22.7R2.5, Ivanti Policy Secure versions 22.7R1 through 22.7R1.2, and Ivanti Neurons for ZTA Gateways versions 22.7R2 through 22.7R2.3, although to date, the flaw only appears to have been exploited to compromise Ivanti Connect Secure appliances.

A second stack buffer overflow flaw has also been patched, although it is not currently being exploited. The high severity flaw is tracked as CVE-2025-0283 and has a CVSS severity score of 7.0. The vulnerability affects Ivanti Connect Secure 22.7R2.4 and prior versions and 9.1R18.9 and prior versions, Ivanti Policy Secure 22.7R1.2 and prior versions, and Ivanti Neurons for ZTA Gateways 22.7R2.3 and prior versions.

Ivanti has released a patch to fix both flaws on its Connect Secure appliances and customers are advised to update their appliances to firmware version 22.7R2.5 as soon as possible to prevent exploitation. Internal and external ICT scans should be conducted prior to upgrading to the latest version. If signs of compromise are detected, a factory reset should be performed before upgrading to the patched version, which should remove any malware; however, even if the scans are clean, a factory reset should be performed prior to upgrading as a precaution.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Patches are planned for release on January 21, 2025, to fix the vulnerabilities on Ivanti Policy Secure and Ivanti Neurons for ZTA Gateways (v 22.7R2.5). Since Ivanti Policy Secure should not be Internet facing, the risk of exploitation of the vulnerability is much lower, and the vulnerability cannot be exploited on Ivanti Neurons for ZTA Gateways when in production; however, Ivanti has warned that if a gateway for the solution is generated and left unconnected to a ZTA controller, the flaw could be exploited on the generated gateway.

Mandiant has been working with Ivanti on response and recovery and said some of the malware installed on appliances has previously been used by a China-nexus threat group it tracks as UNC5337, but says multiple threat actors may be using the malware. Mandiant reports that after exploiting the flaw and installing malware, the threat actor moves laterally within victims’ environments and performs log entry removal, network tunneling, and credential harvesting. In some cases, the threat actor has tricked administrators into thinking they have successfully upgraded their system by displaying a fake upgrade progress bar after using malware to block legitimate system upgrades.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist