CVE-2025-22457

CRITICAL KEV RANSOMWARE NUCLEI

Ivanti Connect Secure Unauthenticated Remote Code Execution via Stack-based Buffer Overflow

Title source: metasploit

Description

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

Exploits (6)

nomisec WORKING POC 71 stars
by sfewer-r7 · remote
https://github.com/sfewer-r7/CVE-2025-22457
nomisec SCANNER 19 stars
by securekomodo · dos
https://github.com/securekomodo/CVE-2025-22457
nomisec WORKING POC 2 stars
by Vinylrider · dos
https://github.com/Vinylrider/ivantiunlocker
nomisec WORKING POC 1 stars
by TRone-ux · remote
https://github.com/TRone-ux/CVE-2025-22457

Nuclei Templates (1)

Ivanti Connect Secure - Stack-based Buffer Overflow
CRITICALby s4e-io,pussycat0x
Shodan: http.title:"ivanti connect secure"
FOFA: title="ivanti connect secure"

Scores

CVSS v3 9.0
EPSS 0.5366
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

CISA KEV 2025-04-04
VulnCheck KEV 2025-04-03
ENISA EUVD EUVD-2025-9646
Ransomware Use Confirmed
CWE
CWE-121 CWE-787
Status published
Products (6)
ivanti/connect_secure 22.7 (13 CPE variants)
ivanti/connect_secure < 22.7
ivanti/policy_secure 22.7 (5 CPE variants)
ivanti/policy_secure < 22.7
ivanti/zero_trust_access_gateway 22.8 (2 CPE variants)
ivanti/zero_trust_access_gateway < 22.8
Published Apr 03, 2025
KEV Added Apr 04, 2025
Tracked Since Feb 18, 2026