Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Ivanti: Security Updates Released (AL02/250109/CSIRT-ITA)

Ivanti: Security Updates Released (AL02/250109/CSIRT-ITA)

Summary

Ivanti releases security updates that address 2 vulnerabilities, one with a severity of “critical” and one with a severity of “high,” in the Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons products.

Note: A Proof of Concept (PoC) for the exploitation of the CVE-2025-0282 vulnerability is available online.

Note: The vendor states that CVE-2025-0282 is actively being exploited online.

Risk

Vulnerability impact estimate on the reference community: Critical (78.2)

Type

  • Remote Code Execution
  • Privilege Escalation

Affected products and/or versions

  • Ivanti Connect Secure, version 22.7R2.4 and earlier
  • Ivanti Connect Secure, version 9.1R18.9 and earlier
  • Ivanti Policy Secure, version 22.7R1.2 and earlier
  • Ivanti Neurons for Gateway ZTA, version 22.7R2.3 and earlier

Mitigation actions

In line with the vendor’s statements, it is recommended to update the vulnerable products following the instructions in the security bulletin reported in the References section.

In particular, it is recommended, before proceeding with the update, to verify the possible compromise of the device, if affected by the indicated vulnerabilities, using the Integrity Checker Tool (ICT) reported in the vendor’s bulletin.

For product versions for which the vendor has not yet released updates, we recommend following the mitigations reported in the “Solution” section of the security bulletin and monitoring for the release of further updates.

CVE
CVE-2025-0282
CVE-2025-0283

References

https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283

https://portal.ivanti.com/

https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day?e=48754805

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services