First published: Thu Apr 03 2025(Updated: )
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Credit: 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
Affected Software | Affected Version | How to fix |
---|---|---|
Ivanti Pulse Connect Secure | <22.7R2.6 | |
Ivanti Connect Secure | <22.7R1.4 | |
Ivanti Connect Secure | <22.8R2.2 | |
Ivanti Connect Secure | ||
Ivanti Pulse Connect Secure | <22.7 | |
Ivanti Pulse Connect Secure | =22.7 | |
Ivanti Pulse Connect Secure | =22.7-r1 | |
Ivanti Pulse Connect Secure | =22.7-r1.1 | |
Ivanti Pulse Connect Secure | =22.7-r1.2 | |
Ivanti Pulse Connect Secure | =22.7-r1.3 | |
Ivanti Pulse Connect Secure | =22.7-r1.4 | |
Ivanti Pulse Connect Secure | =22.7-r1.5 | |
Ivanti Pulse Connect Secure | =22.7-r2 | |
Ivanti Pulse Connect Secure | =22.7-r2.1 | |
Ivanti Pulse Connect Secure | =22.7-r2.2 | |
Ivanti Pulse Connect Secure | =22.7-r2.3 | |
Ivanti Pulse Connect Secure | =22.7-r2.4 | |
Ivanti Pulse Connect Secure | =22.7-r2.5 | |
Ivanti Neurons for ZTA gateways | ||
Ivanti Neurons for ZTA gateways | =22.2-r1 | |
Ivanti Neurons for ZTA gateways | =22.2-r4 | |
Ivanti Neurons for ZTA gateways | =22.2-r5 | |
Ivanti Neurons for ZTA gateways | =22.3-r1 | |
Ivanti Neurons for ZTA gateways | =22.3-r4 | |
Ivanti Neurons for ZTA gateways | =22.4-r1 | |
Ivanti Neurons for ZTA gateways | =22.4-r3 | |
Ivanti Neurons for ZTA gateways | =22.5-r1 | |
Ivanti Neurons for ZTA gateways | =22.5-r1.2 | |
Ivanti Neurons for ZTA gateways | =22.6-r1 | |
Ivanti Neurons for ZTA gateways | =22.6-r1.2 | |
Ivanti Neurons for ZTA gateways | =22.6-r1.3 | |
Ivanti Neurons for ZTA gateways | =22.6-r1.5 | |
Ivanti Neurons for ZTA gateways | =22.6-r1.6 | |
Ivanti Neurons for ZTA gateways | =22.6-r1.7 | |
Ivanti Neurons for ZTA gateways | =22.7-r1 | |
Ivanti Neurons for ZTA gateways | =22.7-r1.2 | |
Ivanti Neurons for ZTA gateways | =22.7-r1.3 | |
Ivanti Neurons for ZTA gateways | =22.7-r1.4 | |
Ivanti Neurons for ZTA gateways | =22.7-r1.5 | |
Ivanti Neurons for ZTA gateways | =22.7-r1.6 | |
Ivanti Neurons for ZTA gateways | =22.7-r2 | |
Ivanti Neurons for ZTA gateways | =22.7-r2.2 | |
Ivanti Neurons for ZTA gateways | =22.7-r2.3 | |
Ivanti Neurons for ZTA gateways | =22.8-r1 | |
Ivanti Neurons for ZTA gateways | =22.8-r1.1 | |
Ivanti Neurons for ZTA gateways | =22.8-r2 | |
Ivanti Connect Secure | <22.7 | |
Ivanti Connect Secure | =22.7 | |
Ivanti Connect Secure | =22.7-r1 | |
Ivanti Connect Secure | =22.7-r1.1 | |
Ivanti Connect Secure | =22.7-r1.2 | |
Ivanti Connect Secure | =22.7-r1.3 |
Apply mitigations as set forth in the CISA instructions linked below.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-22457 has a high severity rating due to its potential for remote code execution.
To fix CVE-2025-22457, upgrade Ivanti Connect Secure to version 22.7R2.6, Ivanti Policy Secure to version 22.7R1.4, or Ivanti ZTA Gateways to version 22.8R2.2.
CVE-2025-22457 affects users of Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti ZTA Gateways prior to their respective patched versions.
CVE-2025-22457 is classified as a stack-based buffer overflow vulnerability.
Yes, CVE-2025-22457 can be exploited by a remote unauthenticated attacker.