On Wednesday, January 8th, Ivanti disclosed two severe vulnerabilities affecting Ivanti Connect Secure VPN devices. Ivanti Connect Secure is an external-facing SSL VPN used to secure remote access to corporate networks. Ivanti Policy Secure is an internal network-access control solution designed for regulating access within an enterprise’s network.
The critical vulnerability (CVSS 9.0) CVE-2025-0282 allows unauthenticated remote code execution (RCE) through a stack-based buffer overflow. This vulnerability specifically targets Ivanti Connect Secure appliances and the vendor has confirmed exploitation in the wild alongside a public POC.
CVE-2025-0283 involves a similar buffer overflow mechanism and allows for local privilege escalation by an authenticated attacker. As of publication, there is no evidence of active exploitation of this high-severity vulnerability (CVSS 7.0).
While these two vulnerabilities are very similar, there have been no reports of these two vulnerabilities being chained in any known exploit scenarios.
The following assets are affected by CVE-2025-0282 and CVE-2025-0283:
Note: The Ivanti Connect Secure 9.x line of code reached end of life (EOL) on December 31, 2024, and Ivanti has confirmed that it will not receive a patch for CVE-2025-0283. However, CVE-2025-0282, which is confirmed as exploited, does not impact the 9.x line of code.
The following patches are available for CVE-2025-0282 and CVE-2025-0283:
Because there have been reports of attempted exploitation of CVE-2025-0282, Ivanti has recommended that customers closely monitor their internal and external integrity check tool (ICT) for any signs of exploitation.
CyCognito customers can check their assets to identify if any are potentially vulnerable to these issues using filters available in the CyCognito dashboard. CyCognito is also investigating non-intrusive testing methods to identify CVE-2025-0282 and CVE-2025-0283.
Figure 1: The alert sent by CyCognito for CVE-2025-0282 and CVE-2025-0283
CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.
Emma Zaballos is an avid threat researcher who is passionate about understanding and combatting cybercrime threats. Emma enjoys monitoring dark web marketplaces, profiling ransomware gangs, and using intelligence for understanding cybercrime.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.