CVE-2025-0282
Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability
Severity Score
9.0
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
14
*Multiple Sources
Exploited in Wild
Yes
*KEV
Decision
Act
*SSVC
Descriptions
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Act
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-01-06 CVE Reserved
- 2025-01-08 CVE Published
- 2025-01-08 Exploited in Wild
- 2025-01-09 First Exploit
- 2025-01-15 EPSS Updated
- 2025-01-15 KEV Due Date
- 2025-01-28 CVE Updated
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
- CAPEC-100: Overflow Buffers
References (15)
URL | Tag | Source |
---|---|---|
https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/188667 | 2025-01-14 | |
https://packetstorm.news/files/id/188717 | 2025-01-16 | |
https://packetstorm.news/files/id/188716 | 2025-01-16 | |
https://github.com/securexploit1/CVE-2025-0282 | 2025-01-09 | |
https://github.com/NyxanGoat/CVE-2025-0282-PoC | 2025-01-10 | |
https://github.com/BishopFox/CVE-2025-0282-check | 2025-01-13 | |
https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit | 2025-01-14 | |
https://github.com/AnonStorks/CVE-2025-0282-Full-version | 2025-01-12 | |
https://github.com/rxwx/pulse-meter | 2025-01-14 | |
https://github.com/watchtowrlabs/CVE-2025-0282 | 2025-01-21 | |
https://github.com/sfewer-r7/CVE-2025-0282 | 2025-01-21 | |
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser | 2025-01-20 | |
https://github.com/chiefchainer/CVE-2025-0282 | 2025-01-22 | |
https://github.com/AdaniKamal/CVE-2025-0282 | 2025-01-28 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ivanti Search vendor "Ivanti" | Connect Secure Search vendor "Ivanti" for product "Connect Secure" | * | - |
Affected
| ||||||
Ivanti Search vendor "Ivanti" | Neurons For Zero-trust Access Search vendor "Ivanti" for product "Neurons For Zero-trust Access" | * | - |
Affected
| ||||||
Ivanti Search vendor "Ivanti" | Policy Secure Search vendor "Ivanti" for product "Policy Secure" | * | - |
Affected
|