Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55147: CWE-352 Cross-Site Request Forgery (CSRF) in Ivanti Connect Secure

0
High
VulnerabilityCVE-2025-55147cvecve-2025-55147cwe-352
Published: Tue Sep 09 2025 (09/09/2025, 15:32:25 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Connect Secure

Description

CSRF in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to execute sensitive actions on behalf of the victim user. User interaction is required

AI-Powered Analysis

AILast updated: 09/17/2025, 01:15:42 UTC

Technical Analysis

CVE-2025-55147 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting multiple Ivanti products, including Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. The vulnerability exists in versions prior to 22.7R2.9 or 22.8R2 for Connect Secure, 22.7R1.6 for Policy Secure, 2.8R2.3-723 for ZTA Gateway, and 22.8R1.4 for Neurons for Secure Access. The flaw allows a remote unauthenticated attacker to trick an authenticated user into executing unintended and sensitive actions on the affected system. This is possible because the affected Ivanti products do not adequately verify the origin of requests, enabling attackers to craft malicious web requests that the victim’s browser executes with the victim’s privileges. The vulnerability requires user interaction, meaning the victim must be tricked into visiting a malicious webpage or clicking a crafted link. The CVSS v3.1 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability, combined with ease of exploitation (no privileges required, network attack vector, low attack complexity). The vulnerability was publicly disclosed on September 9, 2025, with fixes deployed on August 2, 2025. No known exploits are currently observed in the wild. The CWE-352 classification confirms the nature of the vulnerability as a CSRF issue, which typically arises from missing or inadequate anti-CSRF tokens or origin checks in web applications. Given the critical role Ivanti Connect Secure and related products play in secure remote access and policy enforcement, exploitation could lead to unauthorized administrative actions, session hijacking, or compromise of secure access controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Ivanti products in enterprise environments for secure VPN access, zero trust enforcement, and policy management. Successful exploitation could lead to unauthorized changes in security configurations, exposure of sensitive data, or disruption of secure access services. This could facilitate lateral movement by attackers, data breaches, or denial of service conditions impacting business continuity. Given the high confidentiality, integrity, and availability impacts, organizations handling sensitive personal data under GDPR or critical infrastructure sectors could face regulatory penalties and reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the attack surface. The absence of known exploits in the wild currently provides a window for remediation, but the high CVSS score indicates that once weaponized, the vulnerability could be leveraged in targeted attacks against European enterprises, especially those relying heavily on Ivanti’s secure access solutions.

Mitigation Recommendations

Organizations should immediately verify their Ivanti product versions and apply the vendor-provided patches released on August 2, 2025. If patching is not immediately feasible, implement compensating controls such as enforcing strict Content Security Policy (CSP) headers and SameSite cookie attributes to mitigate CSRF risks. Additionally, review and enhance web application firewall (WAF) rules to detect and block suspicious cross-site requests targeting Ivanti management interfaces. Educate users about phishing risks and the importance of not clicking on untrusted links or visiting suspicious websites while authenticated to Ivanti portals. Network segmentation should be employed to limit access to Ivanti management interfaces only to trusted internal networks or VPN users. Monitoring and logging of administrative actions on Ivanti products should be enhanced to detect anomalous behavior indicative of CSRF exploitation attempts. Finally, consider implementing multi-factor authentication (MFA) for administrative access to reduce the impact of compromised sessions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-07T16:15:48.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c04a24f67a6277124b5f9e

Added to database: 9/9/2025, 3:39:16 PM

Last enriched: 9/17/2025, 1:15:42 AM

Last updated: 10/30/2025, 5:02:05 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats