CVE-2022-35254: Use After Free (CWE-416) in Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway
An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.
AI Analysis
Technical Summary
CVE-2022-35254 is a high-severity use-after-free vulnerability (CWE-416) affecting multiple Ivanti products, specifically Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway. The vulnerability exists in versions prior to ICS 9.1R14.3, 9.1R15.2, 9.1R16.2, 22.2R1, and 22.2R4; IPS versions prior to 9.1R17 and 22.3R1; and Ivanti Neurons for Zero Trust Access Gateway versions prior to 22.3R1. This vulnerability allows an unauthenticated attacker to trigger a denial-of-service (DoS) condition by exploiting a use-after-free flaw. Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially leading to crashes or other unpredictable behavior. In this case, the attacker does not require any authentication or user interaction, and the attack can be launched remotely over the network (CVSS vector AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, as the vulnerability does not affect confidentiality or integrity. Exploitation results in a denial-of-service, causing the affected Ivanti gateway products to crash or become unresponsive, disrupting secure remote access and zero-trust access services. There are no known public exploits in the wild as of the published date (December 5, 2022), but the vulnerability has been recognized and enriched by CISA, indicating its importance. The affected products are critical components in enterprise network security, providing VPN, policy enforcement, and zero-trust access capabilities. Given the unauthenticated remote attack vector and the critical role these products play in secure access, this vulnerability poses a significant risk to organizations relying on Ivanti's secure access solutions.
Potential Impact
For European organizations, the impact of CVE-2022-35254 can be substantial. Ivanti Connect Secure, Policy Secure, and Neurons for Zero Trust Access Gateway are widely used in enterprises to provide secure remote access, VPN services, and zero-trust network access. A successful denial-of-service attack could disrupt business continuity by preventing employees and partners from securely accessing internal resources, especially in the context of increased remote work and hybrid environments. This disruption could affect critical sectors such as finance, healthcare, government, and manufacturing, where secure access is essential. Additionally, prolonged downtime could lead to operational delays, loss of productivity, and potential regulatory compliance issues related to availability of critical services. Although the vulnerability does not allow data theft or manipulation, the availability impact alone can cause significant operational and reputational damage. Furthermore, the unauthenticated nature of the exploit means attackers do not need valid credentials, increasing the risk of opportunistic attacks or targeted campaigns against organizations using these Ivanti products.
Mitigation Recommendations
1. Immediate patching: Organizations should prioritize updating affected Ivanti products to the fixed versions: ICS versions 9.1R14.3, 9.1R15.2, 9.1R16.2, 22.2R4 or later; IPS versions 9.1R17 and 22.3R1 or later; and Ivanti Neurons for Zero Trust Access Gateway 22.3R1 or later. 2. Network segmentation: Limit exposure of Ivanti gateway devices by placing them behind firewalls and restricting access to trusted IP ranges where possible, reducing the attack surface. 3. Monitoring and alerting: Implement enhanced monitoring on Ivanti gateway devices to detect unusual traffic patterns or repeated connection attempts that could indicate exploitation attempts. 4. Incident response readiness: Prepare incident response plans specifically for denial-of-service scenarios affecting secure access infrastructure to minimize downtime and restore services quickly. 5. Vendor communication: Maintain active communication with Ivanti for any additional advisories or patches and subscribe to threat intelligence feeds for updates on exploitation attempts. 6. Access control hardening: Where feasible, enforce multi-factor authentication and limit administrative access to Ivanti devices to reduce risk from secondary attacks during downtime. 7. Backup and redundancy: Ensure redundant Ivanti gateway deployments and regular configuration backups to enable rapid failover and recovery in case of service disruption.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2022-35254: Use After Free (CWE-416) in Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway
Description
An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.
AI-Powered Analysis
Technical Analysis
CVE-2022-35254 is a high-severity use-after-free vulnerability (CWE-416) affecting multiple Ivanti products, specifically Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), and Ivanti Neurons for Zero Trust Access Gateway. The vulnerability exists in versions prior to ICS 9.1R14.3, 9.1R15.2, 9.1R16.2, 22.2R1, and 22.2R4; IPS versions prior to 9.1R17 and 22.3R1; and Ivanti Neurons for Zero Trust Access Gateway versions prior to 22.3R1. This vulnerability allows an unauthenticated attacker to trigger a denial-of-service (DoS) condition by exploiting a use-after-free flaw. Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially leading to crashes or other unpredictable behavior. In this case, the attacker does not require any authentication or user interaction, and the attack can be launched remotely over the network (CVSS vector AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, as the vulnerability does not affect confidentiality or integrity. Exploitation results in a denial-of-service, causing the affected Ivanti gateway products to crash or become unresponsive, disrupting secure remote access and zero-trust access services. There are no known public exploits in the wild as of the published date (December 5, 2022), but the vulnerability has been recognized and enriched by CISA, indicating its importance. The affected products are critical components in enterprise network security, providing VPN, policy enforcement, and zero-trust access capabilities. Given the unauthenticated remote attack vector and the critical role these products play in secure access, this vulnerability poses a significant risk to organizations relying on Ivanti's secure access solutions.
Potential Impact
For European organizations, the impact of CVE-2022-35254 can be substantial. Ivanti Connect Secure, Policy Secure, and Neurons for Zero Trust Access Gateway are widely used in enterprises to provide secure remote access, VPN services, and zero-trust network access. A successful denial-of-service attack could disrupt business continuity by preventing employees and partners from securely accessing internal resources, especially in the context of increased remote work and hybrid environments. This disruption could affect critical sectors such as finance, healthcare, government, and manufacturing, where secure access is essential. Additionally, prolonged downtime could lead to operational delays, loss of productivity, and potential regulatory compliance issues related to availability of critical services. Although the vulnerability does not allow data theft or manipulation, the availability impact alone can cause significant operational and reputational damage. Furthermore, the unauthenticated nature of the exploit means attackers do not need valid credentials, increasing the risk of opportunistic attacks or targeted campaigns against organizations using these Ivanti products.
Mitigation Recommendations
1. Immediate patching: Organizations should prioritize updating affected Ivanti products to the fixed versions: ICS versions 9.1R14.3, 9.1R15.2, 9.1R16.2, 22.2R4 or later; IPS versions 9.1R17 and 22.3R1 or later; and Ivanti Neurons for Zero Trust Access Gateway 22.3R1 or later. 2. Network segmentation: Limit exposure of Ivanti gateway devices by placing them behind firewalls and restricting access to trusted IP ranges where possible, reducing the attack surface. 3. Monitoring and alerting: Implement enhanced monitoring on Ivanti gateway devices to detect unusual traffic patterns or repeated connection attempts that could indicate exploitation attempts. 4. Incident response readiness: Prepare incident response plans specifically for denial-of-service scenarios affecting secure access infrastructure to minimize downtime and restore services quickly. 5. Vendor communication: Maintain active communication with Ivanti for any additional advisories or patches and subscribe to threat intelligence feeds for updates on exploitation attempts. 6. Access control hardening: Where feasible, enforce multi-factor authentication and limit administrative access to Ivanti devices to reduce risk from secondary attacks during downtime. 7. Backup and redundancy: Ensure redundant Ivanti gateway deployments and regular configuration backups to enable rapid failover and recovery in case of service disruption.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2022-07-06T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf11b6
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/22/2025, 1:36:02 AM
Last updated: 2/7/2026, 9:18:00 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.