Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55141: CWE-862 Missing Authorization in Ivanti Connect Secure

0
High
VulnerabilityCVE-2025-55141cvecve-2025-55141cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 15:45:52 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Connect Secure

Description

Missing authorization in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with read-only admin privileges to configure authentication related settings.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:15:09 UTC

Technical Analysis

CVE-2025-55141 is a high-severity vulnerability classified under CWE-862 (Missing Authorization) affecting multiple Ivanti products, including Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. The flaw exists in versions prior to 22.7R2.9 or 22.8R2 for Connect Secure, 22.7R1.6 for Policy Secure, 2.8R2.3-723 for ZTA Gateway, and 22.8R1.4 for Neurons for Secure Access. This vulnerability allows a remote attacker who has authenticated access with read-only administrative privileges to bypass authorization controls and modify authentication-related settings. The vulnerability does not require user interaction and can be exploited over the network with low complexity. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, as the attacker can escalate privileges by changing authentication configurations, potentially leading to unauthorized access, credential compromise, or denial of service. The flaw stems from improper enforcement of authorization checks, allowing read-only admins to perform actions beyond their intended permissions. Although no known exploits are reported in the wild as of the publication date, the vulnerability poses a significant risk due to the sensitive nature of the affected settings and the widespread use of Ivanti products in enterprise environments for secure remote access and policy enforcement. The fix was deployed on August 2, 2025, but systems not updated remain vulnerable.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for enterprises relying on Ivanti solutions for secure remote access and zero-trust network access (ZTA). Successful exploitation could allow attackers to alter authentication mechanisms, potentially enabling unauthorized access to corporate networks, data exfiltration, or disruption of secure access services. This could lead to breaches of sensitive personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Critical infrastructure operators, financial institutions, healthcare providers, and government agencies using Ivanti products are particularly at risk due to the potential for widespread service disruption and data compromise. The ability to escalate privileges from read-only admin to configuration changes undermines internal security controls and could facilitate lateral movement within networks. Given the remote network attack vector and lack of required user interaction, the threat is highly relevant in the current threat landscape where remote work and VPN usage remain prevalent across Europe.

Mitigation Recommendations

European organizations should immediately verify their Ivanti product versions and apply the security patches released on August 2, 2025. In cases where patching is delayed, organizations should implement compensating controls such as restricting read-only admin accounts to the minimum necessary personnel, enforcing strict network segmentation to limit access to Ivanti management interfaces, and monitoring for anomalous changes to authentication settings. Employing multi-factor authentication (MFA) for all administrative access can reduce the risk of credential compromise. Additionally, organizations should audit logs for unauthorized configuration changes and integrate Ivanti product monitoring into their Security Information and Event Management (SIEM) systems to detect suspicious activities promptly. Regularly reviewing and tightening role-based access controls (RBAC) within Ivanti products will help minimize the attack surface. Finally, conducting penetration tests and vulnerability assessments focused on Ivanti infrastructure can identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-07T16:15:48.896Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c04d9dbfc619fb092d2a59

Added to database: 9/9/2025, 3:54:05 PM

Last enriched: 9/17/2025, 1:15:09 AM

Last updated: 10/29/2025, 9:46:11 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats