Ivanti Connect Secure, Policy Secure, ZTA Gateways Flaw Under Active Exploitation
A vulnerability affecting Ivanti Connect Secure, Policy Secure, Neurons for ZTA Gateways, and Pulse Connect Secure is being actively exploited by a China-nexus threat actor, according to a recent alert from the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
The stack-based buffer overflow vulnerability is tracked as CVE-2025-22457 and is rated critical, with a CVSS v3.1 base score of 9.0. Successful exploitation of the vulnerability can lead to remote code execution by an unauthenticated threat actor, allowing them to take full control of an affected system.
Mandiant reports that the vulnerability has been exploited in attacks on legacy VPNs by a threat actor tracked as UNC5221. Malware was deployed after exploiting the vulnerability, and Mandiant has also observed the threat actor attempting to modify the Integrity Checker Tool to avoid detection.
The vulnerability affects the following products:
Get The FREE
HIPAA Compliance Checklist
Immediate Delivery of Checklist Link To Your Email Address
Please Enter Correct Email Address
Your Privacy Respected
HIPAA Journal Privacy Policy
- Pulse Connect Secure (version 9.1x, which reached end-of-support December 31, 2024)
- Ivanti Connect Secure (version 22.7R2.5 and earlier)
- Policy Secure and Neurons for ZTA gateways
Ivanti fixed the vulnerability in Ivanti Connect Secure 22.7R2.6, which was released on February 11, 2025. No patch is being released for Pulse Connect Secure as the product has reached end of life. Customers still using the legacy solution should ensure they migrate to Ivanti Connect Secure or an alternative secure solution.
Ivanti has warned customers that Policy Secure should not be Internet facing, and if deployed according to Ivanti guidance, users are at a reduced risk from the vulnerability. Ivanti has also advised customers that the vulnerability cannot be exploited against Neurons for ZTA gateways when in production.
Ivanti is aware of limited cases of customers having the vulnerability exploited while running Ivanti Connect Secure 22.7R2.5 (or earlier versions) or Pulse Connect Secure 9.1x. There are no known instances of exploitation against Ivanti Policy Secure or Neurons for ZTA gateways.
Customers should conduct threat hunting activities to determine if the vulnerability has already been exploited if they failed to update to the secure version of Ivanti Connect Secure (22.7R2.6) by February 28, 2025, and threat hunting activity is advised for all instances of Pulse Connect Secure (EoS), Policy Secure, and ZTA Gateways.
The recommended actions are to run an external Integrity Checker Tool (ICT) and also conduct threat hunting actions on systems connected to the Ivanti devices. If evidence of exploitation is found, the affected devices should be isolated, a forensic image taken, and compromised instances should be disconnected. If no compromise is identified, CISA recommends conducting a factory reset for the highest level of confidence. The recommended actions are included in the CISA alert.
“Following initial identification of the compromise by Ivanti’s Integrity Checker Tool (ICT), Ivanti quickly investigated, identified the vulnerability and disclosed it to customers. Additionally, Ivanti partnered with Mandiant to provide additional information to defenders. Importantly, this vulnerability was fixed in ICS 22.7R2.6, released February 11, 2025, and customers running supported versions on their appliances and in accordance with the guidance provided by Ivanti have a significantly reduced risk. Customers running ICS 9.X (end of life) and 22.7R2.5 and earlier are encouraged to upgrade as soon as possible and follow the other actions outlined in the Security Advisory. Ivanti’s ICT has been successful in detecting potential compromise on a limited number of customers running ICS 9.X (end of life) and 22.7R2.5 and earlier versions,” explained Ivanti in a statement to The HIPAA Journal. “As network security devices and edge devices in particular remain a focus of sophisticated and highly persistent threat actors, Ivanti is committed to providing information to ensure defenders can take every possible step to secure their environments.”


