CVE-2025-0282
Published: 08 January 2025
Description
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
Security Summary
CVE-2025-0282 is a stack-based buffer overflow vulnerability, associated with CWE-121 and CWE-787, affecting Ivanti Connect Secure versions before 22.7R2.5, Ivanti Policy Secure before 22.7R1.2, and Ivanti Neurons for ZTA gateways before 22.7R2.3. Published on January 8, 2025, it carries a CVSS v3.1 base score of 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity with network accessibility, high attack complexity, no privileges or user interaction required, and high impact across confidentiality, integrity, and availability with a changed scope.
A remote unauthenticated attacker can exploit this vulnerability to achieve remote code execution on affected systems. The high attack complexity suggests it requires specific conditions or crafted payloads, but successful exploitation grants full control over the targeted gateway or VPN appliance.
Ivanti's security advisory details patches in Connect Secure 22.7R2.5, Policy Secure 22.7R1.2, and Neurons for ZTA gateways 22.7R2.3, urging immediate upgrades. CISA provides mitigation instructions, while additional resources include exploitation walkthroughs and a GitHub proof-of-concept.
References to this CVE as a zero-day in threat intelligence, alongside public PoCs and detailed exploit techniques, highlight active research and potential for real-world abuse targeting Ivanti VPN and gateway deployments.
Details
- CWE(s)
- KEV Date Added
- 08 January 2025