First published: Wed Jan 08 2025(Updated: )
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Connect Secure, Policy Secure, and ZTA Gateways | ||
Ivanti Connect Secure | =22.7-r2 | |
Ivanti Connect Secure | =22.7-r2.1 | |
Ivanti Connect Secure | =22.7-r2.2 | |
Ivanti Connect Secure | =22.7-r2.3 | |
Ivanti Connect Secure | =22.7-r2.4 | |
Ivanti Neurons for Zero-Trust Access | =22.7-r2 | |
Ivanti Neurons for Zero-Trust Access | =22.7-r2.2 | |
Ivanti Neurons for Zero-Trust Access | =22.7-r2.3 | |
Ivanti Policy Secure | =22.7-r1 | |
Ivanti Policy Secure | =22.7-r1.1 | |
Ivanti Policy Secure | =22.7-r1.2 |
Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.