CVE-2025-55142: CWE-862 Missing Authorization in Ivanti Connect Secure
Missing authorization in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with read-only admin privileges to configure authentication related settings.
AI Analysis
Technical Summary
CVE-2025-55142 is a vulnerability classified under CWE-862 (Missing Authorization) affecting multiple Ivanti products: Connect Secure (before 22.7R2.9 or 22.8R2), Policy Secure (before 22.7R1.6), ZTA Gateway (before 2.8R2.3-723), and Neurons for Secure Access (before 22.8R1.4). The flaw allows a remote attacker who has authenticated with read-only administrative privileges to bypass authorization controls and configure authentication-related settings. This means that an attacker who should only have limited read-only access can escalate their privileges to modify critical security configurations, potentially enabling further attacks such as privilege escalation, unauthorized access, or denial of service. The vulnerability is remotely exploitable over the network without requiring user interaction. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement of only low privileges. The flaw was fixed in August 2025, but versions prior to the fixed releases remain vulnerable. No public exploits have been reported yet, but the potential for misuse is significant given the nature of the affected products, which are widely used for secure remote access and zero trust network access (ZTNA).
Potential Impact
The vulnerability poses a significant risk to organizations worldwide that rely on Ivanti Connect Secure and related products for secure remote access and authentication management. By allowing an attacker with read-only admin privileges to alter authentication settings, the flaw can lead to unauthorized access, privilege escalation, and potential compromise of sensitive data and systems. This can undermine the integrity of authentication mechanisms, enabling attackers to create backdoors, disable security controls, or disrupt service availability. The impact extends to confidentiality breaches, integrity violations, and availability disruptions, potentially affecting business continuity and regulatory compliance. Given the critical role of these products in enterprise security architectures, exploitation could facilitate lateral movement within networks and compromise of critical infrastructure. The absence of known exploits currently provides a window for mitigation, but the high CVSS score and ease of exploitation underscore the urgency for remediation.
Mitigation Recommendations
Organizations should immediately verify the versions of Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access in use and apply the vendor-provided patches released in August 2025 or later. If patching is not immediately feasible, restrict access to the administrative interfaces to trusted networks and users only, employing network segmentation and strict firewall rules. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit user privileges to ensure no unnecessary read-only admin accounts exist, and monitor logs for unusual configuration changes or access patterns. Employ intrusion detection systems (IDS) and security information and event management (SIEM) solutions to detect potential exploitation attempts. Additionally, conduct penetration testing focused on authorization controls to identify any residual weaknesses. Maintain up-to-date backups and incident response plans to quickly recover from any potential compromise.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Japan, South Korea, Netherlands, Singapore
CVE-2025-55142: CWE-862 Missing Authorization in Ivanti Connect Secure
Description
Missing authorization in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with read-only admin privileges to configure authentication related settings.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55142 is a vulnerability classified under CWE-862 (Missing Authorization) affecting multiple Ivanti products: Connect Secure (before 22.7R2.9 or 22.8R2), Policy Secure (before 22.7R1.6), ZTA Gateway (before 2.8R2.3-723), and Neurons for Secure Access (before 22.8R1.4). The flaw allows a remote attacker who has authenticated with read-only administrative privileges to bypass authorization controls and configure authentication-related settings. This means that an attacker who should only have limited read-only access can escalate their privileges to modify critical security configurations, potentially enabling further attacks such as privilege escalation, unauthorized access, or denial of service. The vulnerability is remotely exploitable over the network without requiring user interaction. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement of only low privileges. The flaw was fixed in August 2025, but versions prior to the fixed releases remain vulnerable. No public exploits have been reported yet, but the potential for misuse is significant given the nature of the affected products, which are widely used for secure remote access and zero trust network access (ZTNA).
Potential Impact
The vulnerability poses a significant risk to organizations worldwide that rely on Ivanti Connect Secure and related products for secure remote access and authentication management. By allowing an attacker with read-only admin privileges to alter authentication settings, the flaw can lead to unauthorized access, privilege escalation, and potential compromise of sensitive data and systems. This can undermine the integrity of authentication mechanisms, enabling attackers to create backdoors, disable security controls, or disrupt service availability. The impact extends to confidentiality breaches, integrity violations, and availability disruptions, potentially affecting business continuity and regulatory compliance. Given the critical role of these products in enterprise security architectures, exploitation could facilitate lateral movement within networks and compromise of critical infrastructure. The absence of known exploits currently provides a window for mitigation, but the high CVSS score and ease of exploitation underscore the urgency for remediation.
Mitigation Recommendations
Organizations should immediately verify the versions of Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access in use and apply the vendor-provided patches released in August 2025 or later. If patching is not immediately feasible, restrict access to the administrative interfaces to trusted networks and users only, employing network segmentation and strict firewall rules. Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit user privileges to ensure no unnecessary read-only admin accounts exist, and monitor logs for unusual configuration changes or access patterns. Employ intrusion detection systems (IDS) and security information and event management (SIEM) solutions to detect potential exploitation attempts. Additionally, conduct penetration testing focused on authorization controls to identify any residual weaknesses. Maintain up-to-date backups and incident response plans to quickly recover from any potential compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ivanti
- Date Reserved
- 2025-08-07T16:15:48.896Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c04d9dbfc619fb092d2a5c
Added to database: 9/9/2025, 3:54:05 PM
Last enriched: 2/27/2026, 3:47:10 AM
Last updated: 3/24/2026, 8:15:20 AM
Views: 140
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.