Research

Emerging Threat: Ivanti CVE-2025-22457

Emma-Zaballos
By Emma Zaballos
Product Marketing Manager
April 7, 2025

What is CVE-2025-22457? 

CVE-2025-22457, a critical vulnerability (CVSS 9.0) affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti ZTA Gateways. The issue stems from a stack-based buffer overflow triggered by sending a specially crafted X-Forwarded-For HTTP header. Successful exploitation enables unauthenticated remote code execution.   

This vulnerability was originally misidentified as a buffer overflow vulnerability that could not lead to either remote code execution (RCE) or denial of service (DoS). However, Ivanti later clarified in a patch note that not only was the vulnerability exploitable, it had already been exploited in the wild. 

While patches have been available since February, some teams may have delayed patching because they were unaware that CVE-2025-22457 was a critical vulnerability. 

What assets are affected by CVE-2025-22457? 

  • Ivanti Connect Secure: 22.7R2.5 and prior 
  • Pulse Connect Secure (former name) (EoS): 9.1R18.9 and prior
  • Ivanti Policy Secure: 22.7R1.3 and prior
  • ZTA Gateways: 22.8R2 and prior  

Are fixes available? 

Fixes are available for 

  • Ivanti Connect Secure: upgrade to 22.7R2.6 (released February 5, 2025) 
  • Ivanti Policy Secure: a patch is in development and will be available on April 21.
  • Ivanti ZTA Gateways: a patch is in development and will be automatically applied to environments on April 19.

Because Pulse Connect Secure 9.1x reached End-of-Support on December 31, 2024, these devices no longer receive any code changes and there is no patch available. Ivanti directs customers still using Pulse Connect Secure products to reach out to their contacts at Ivanti to migrate to a secure platform. 

Are there any other recommended actions to take? 

Customers concerned that their devices may have been exploited should monitor their external integrity checking tool (ICT) and look for web server crashes. If your ICT result shows signs of compromise, Ivanti advises  performing a factory reset on the appliance and then putting the appliance back into production using version 22.7R2.6. 

Is CVE-2025-22457 being actively exploited? 

A joint investigation by Mandiant and Ivanti revealed that this vulnerability has been exploited in the wild by known espionage actor UNC5221. CISA has also added this vulnerability to their Known Exploited Vulnerabilities (KEV) catalog. 

How is CyCognito helping customers identify assets vulnerable to CVE-2025-22457? 

CyCognito is actively working on detection capabilities for this vulnerability. In the meantime, customers can review assets running Connect Secure services to assess exposure, even if they are not explicitly identified as running vulnerable versions. 

Figure 1: The alert sent by CyCognito for CVE-2025-22457

How can CyCognito help your organization? 

CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.




About the Author

Emma-Zaballos

Emma Zaballos

Product Marketing Manager

Emma Zaballos is an avid threat researcher who is passionate about understanding and combatting cybercrime threats. Emma enjoys monitoring dark web marketplaces, profiling ransomware gangs, and using intelligence for understanding cybercrime.

Topics



Search the Blog



Featured Posts








Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.

Related Guides

Discover insights on application security, exposure management and other key topics below.

Learning Center Attack Surface
Understanding Attack Surface Management

The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.

Learning Center Exposure Management
Exposure Management in Cybersecurity: Concepts and Technologies

Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.

Learning Center Vulnerability Assessment
Vulnerability Assessment: Process, Challenges & Best Practices

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.

Related Products

Explore CyCognito modules ASM, AST and EI in the resources below.

Platform > Products
Attack Surface Management

Scalable, continuous, and comprehensive testing for all external assets, all the time.

Platform > Products
Automated Security Testing

CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.

Platform > Products
Exploit Intelligence

CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.