CVE-2025-5466: CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') in Ivanti Connect Secure
XEE in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with admin privileges to trigger a denial of service
AI Analysis
Technical Summary
CVE-2025-5466 is a security vulnerability classified under CWE-776, which involves improper restriction of recursive entity references in Document Type Definitions (DTDs), commonly known as XML Entity Expansion or XML External Entity (XEE) attacks. This vulnerability affects multiple Ivanti products including Ivanti Connect Secure (versions before 22.7R2.8 or 22.8R2), Ivanti Policy Secure (before 22.7R1.5), Ivanti ZTA Gateway (before 22.8R2.3-723), and Ivanti Neurons for Secure Access (before 22.8R1.4). The flaw allows a remote attacker who has authenticated with administrative privileges to trigger a denial of service (DoS) condition by exploiting the XML parser’s handling of recursive entity references within DTDs. Specifically, the attacker can craft malicious XML payloads that cause excessive resource consumption (CPU and memory), leading to service disruption or crash of the affected systems. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. The CVSS v3.1 base score is 4.9 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but demands high privileges (admin authentication) and does not require user interaction. The issue was publicly disclosed on August 12, 2025, with fixes deployed on August 2, 2025. No known exploits are currently reported in the wild. This vulnerability highlights the risks associated with XML processing in enterprise security appliances, especially those exposed to administrative interfaces over the network.
Potential Impact
For European organizations, the impact of CVE-2025-5466 can be significant, particularly for enterprises relying on Ivanti’s secure access and policy enforcement solutions. These products are often deployed in critical network security infrastructure, including VPN gateways, zero trust access controls, and policy management systems. A successful DoS attack could disrupt secure remote access capabilities, leading to downtime, loss of productivity, and potential exposure to other security risks due to interrupted security controls. Given that the vulnerability requires administrative authentication, the risk is primarily from insider threats or compromised admin credentials. However, the widespread use of Ivanti products in sectors such as finance, healthcare, government, and large enterprises across Europe means that service outages could have cascading effects on business continuity and regulatory compliance, especially under GDPR and other data protection laws. The denial of service could also impair incident response and security monitoring capabilities, increasing the risk of further exploitation during downtime.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately apply the vendor-provided patches released on August 2, 2025, for all affected Ivanti products to eliminate the XML entity expansion flaw. 2) Restrict administrative access to Ivanti management interfaces using network segmentation, VPNs, and strict access control lists to limit exposure to trusted personnel only. 3) Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 4) Monitor logs and network traffic for unusual XML payloads or spikes in resource usage indicative of attempted XML entity expansion attacks. 5) Conduct regular security audits and penetration testing focused on XML processing components and administrative interfaces. 6) Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect and block malicious XML payloads targeting this vulnerability. 7) Educate administrators on the risks of XML-based attacks and enforce strong password policies to minimize insider threat risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-5466: CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') in Ivanti Connect Secure
Description
XEE in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with admin privileges to trigger a denial of service
AI-Powered Analysis
Technical Analysis
CVE-2025-5466 is a security vulnerability classified under CWE-776, which involves improper restriction of recursive entity references in Document Type Definitions (DTDs), commonly known as XML Entity Expansion or XML External Entity (XEE) attacks. This vulnerability affects multiple Ivanti products including Ivanti Connect Secure (versions before 22.7R2.8 or 22.8R2), Ivanti Policy Secure (before 22.7R1.5), Ivanti ZTA Gateway (before 22.8R2.3-723), and Ivanti Neurons for Secure Access (before 22.8R1.4). The flaw allows a remote attacker who has authenticated with administrative privileges to trigger a denial of service (DoS) condition by exploiting the XML parser’s handling of recursive entity references within DTDs. Specifically, the attacker can craft malicious XML payloads that cause excessive resource consumption (CPU and memory), leading to service disruption or crash of the affected systems. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. The CVSS v3.1 base score is 4.9 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, but demands high privileges (admin authentication) and does not require user interaction. The issue was publicly disclosed on August 12, 2025, with fixes deployed on August 2, 2025. No known exploits are currently reported in the wild. This vulnerability highlights the risks associated with XML processing in enterprise security appliances, especially those exposed to administrative interfaces over the network.
Potential Impact
For European organizations, the impact of CVE-2025-5466 can be significant, particularly for enterprises relying on Ivanti’s secure access and policy enforcement solutions. These products are often deployed in critical network security infrastructure, including VPN gateways, zero trust access controls, and policy management systems. A successful DoS attack could disrupt secure remote access capabilities, leading to downtime, loss of productivity, and potential exposure to other security risks due to interrupted security controls. Given that the vulnerability requires administrative authentication, the risk is primarily from insider threats or compromised admin credentials. However, the widespread use of Ivanti products in sectors such as finance, healthcare, government, and large enterprises across Europe means that service outages could have cascading effects on business continuity and regulatory compliance, especially under GDPR and other data protection laws. The denial of service could also impair incident response and security monitoring capabilities, increasing the risk of further exploitation during downtime.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately apply the vendor-provided patches released on August 2, 2025, for all affected Ivanti products to eliminate the XML entity expansion flaw. 2) Restrict administrative access to Ivanti management interfaces using network segmentation, VPNs, and strict access control lists to limit exposure to trusted personnel only. 3) Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 4) Monitor logs and network traffic for unusual XML payloads or spikes in resource usage indicative of attempted XML entity expansion attacks. 5) Conduct regular security audits and penetration testing focused on XML processing components and administrative interfaces. 6) Consider deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect and block malicious XML payloads targeting this vulnerability. 7) Educate administrators on the risks of XML-based attacks and enforce strong password policies to minimize insider threat risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ivanti
- Date Reserved
- 2025-06-02T11:55:38.875Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689b5b1dad5a09ad0033e2c2
Added to database: 8/12/2025, 3:17:49 PM
Last enriched: 8/12/2025, 3:34:14 PM
Last updated: 8/13/2025, 12:34:29 AM
Views: 5
Related Threats
CVE-2025-8671: CWE-404 Improper Resource Shutdown or Release in IETF HTTP Working Group HTTP/2
HighCVE-2025-48989: CWE-404 Improper Resource Shutdown or Release in Apache Software Foundation Apache Tomcat
HighCVE-2025-55280: CWE-312: Cleartext Storage of Sensitive Information in ZKTeco Co WL20 Biometric Attendance System
MediumCVE-2025-55279: CWE-798: Use of Hard-coded Credentials in ZKTeco Co WL20 Biometric Attendance System
MediumCVE-2025-54465: CWE-798: Use of Hard-coded Credentials in ZKTeco Co WL20 Biometric Attendance System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.