Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-35254: Use After Free (CWE-416) in Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway

0
High
VulnerabilityCVE-2022-35254cvecve-2022-35254use-after-free-cwe-416
Published: Mon Dec 05 2022 (12/05/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway

Description

An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.

AI-Powered Analysis

AILast updated: 06/22/2025, 01:36:02 UTC

Technical Analysis

CVE-2022-35254 is a high-severity use-after-free vulnerability (CWE-416) affecting multiple Ivanti products, specifically Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway. The vulnerability exists in versions prior to ICS 9.1R14.3, 9.1R15.2, 9.1R16.2, 22.2R1, and 22.2R4; IPS versions prior to 9.1R17 and 22.3R1; and Ivanti Neurons for Zero Trust Access Gateway versions prior to 22.3R1. This vulnerability allows an unauthenticated attacker to trigger a denial-of-service (DoS) condition by exploiting a use-after-free flaw. Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially leading to crashes or other unpredictable behavior. In this case, the attacker does not require any authentication or user interaction, and the attack can be launched remotely over the network (CVSS vector AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, as the vulnerability does not affect confidentiality or integrity. Exploitation results in a denial-of-service, causing the affected Ivanti gateway products to crash or become unresponsive, disrupting secure remote access and zero-trust access services. There are no known public exploits in the wild as of the published date (December 5, 2022), but the vulnerability has been recognized and enriched by CISA, indicating its importance. The affected products are critical components in enterprise network security, providing VPN, policy enforcement, and zero-trust access capabilities. Given the unauthenticated remote attack vector and the critical role these products play in secure access, this vulnerability poses a significant risk to organizations relying on Ivanti's secure access solutions.

Potential Impact

For European organizations, the impact of CVE-2022-35254 can be substantial. Ivanti Connect Secure, Policy Secure, and Neurons for Zero Trust Access Gateway are widely used in enterprises to provide secure remote access, VPN services, and zero-trust network access. A successful denial-of-service attack could disrupt business continuity by preventing employees and partners from securely accessing internal resources, especially in the context of increased remote work and hybrid environments. This disruption could affect critical sectors such as finance, healthcare, government, and manufacturing, where secure access is essential. Additionally, prolonged downtime could lead to operational delays, loss of productivity, and potential regulatory compliance issues related to availability of critical services. Although the vulnerability does not allow data theft or manipulation, the availability impact alone can cause significant operational and reputational damage. Furthermore, the unauthenticated nature of the exploit means attackers do not need valid credentials, increasing the risk of opportunistic attacks or targeted campaigns against organizations using these Ivanti products.

Mitigation Recommendations

1. Immediate patching: Organizations should prioritize updating affected Ivanti products to the fixed versions: ICS versions 9.1R14.3, 9.1R15.2, 9.1R16.2, 22.2R4 or later; IPS versions 9.1R17 and 22.3R1 or later; and Ivanti Neurons for Zero Trust Access Gateway 22.3R1 or later. 2. Network segmentation: Limit exposure of Ivanti gateway devices by placing them behind firewalls and restricting access to trusted IP ranges where possible, reducing the attack surface. 3. Monitoring and alerting: Implement enhanced monitoring on Ivanti gateway devices to detect unusual traffic patterns or repeated connection attempts that could indicate exploitation attempts. 4. Incident response readiness: Prepare incident response plans specifically for denial-of-service scenarios affecting secure access infrastructure to minimize downtime and restore services quickly. 5. Vendor communication: Maintain active communication with Ivanti for any additional advisories or patches and subscribe to threat intelligence feeds for updates on exploitation attempts. 6. Access control hardening: Where feasible, enforce multi-factor authentication and limit administrative access to Ivanti devices to reduce risk from secondary attacks during downtime. 7. Backup and redundancy: Ensure redundant Ivanti gateway deployments and regular configuration backups to enable rapid failover and recovery in case of service disruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2022-07-06T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf11b6

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/22/2025, 1:36:02 AM

Last updated: 2/7/2026, 9:18:00 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats