Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55147: CWE-352 Cross-Site Request Forgery (CSRF) in Ivanti Connect Secure

0
High
VulnerabilityCVE-2025-55147cvecve-2025-55147cwe-352
Published: Tue Sep 09 2025 (09/09/2025, 15:32:25 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Connect Secure

Description

CSRF in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to execute sensitive actions on behalf of the victim user. User interaction is required

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:48:03 UTC

Technical Analysis

CVE-2025-55147 is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352, affecting Ivanti Connect Secure versions prior to 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723, and Ivanti Neurons for Secure Access before 22.8R1.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unintended actions on behalf of the user. In this case, the vulnerability allows a remote unauthenticated attacker to execute sensitive actions by leveraging the victim's authenticated session, provided the victim interacts with a maliciously crafted link or webpage. The vulnerability affects the confidentiality, integrity, and availability of the affected systems, as attackers can perform unauthorized operations that may lead to data exposure, modification, or service disruption. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The fix was released on August 2, 2025, but no public exploit code or active exploitation has been reported yet. The affected products are widely used in enterprise environments for secure remote access and policy enforcement, making this vulnerability critical to address promptly.

Potential Impact

The impact of CVE-2025-55147 is significant for organizations using Ivanti's secure access and policy enforcement products. Successful exploitation can lead to unauthorized execution of sensitive actions, potentially compromising user credentials, exposing confidential data, altering security policies, or disrupting service availability. Since the attacker does not require authentication and only needs to trick a user into interacting with a malicious link, the attack surface is broad, especially in environments with remote or hybrid workforces. This can lead to lateral movement within networks, privilege escalation, or persistent access. The compromise of secure access gateways can undermine the entire security posture of an organization, exposing internal resources to attackers. Additionally, the vulnerability's presence in multiple Ivanti products increases the risk of widespread impact across different organizational layers. The absence of known exploits in the wild currently provides a window for mitigation, but the high CVSS score underscores the urgency for remediation.

Mitigation Recommendations

Organizations should immediately verify their Ivanti product versions and upgrade to the patched releases: Connect Secure 22.7R2.9 or 22.8R2 and later, Policy Secure 22.7R1.6 and later, ZTA Gateway 2.8R2.3-723 and later, and Neurons for Secure Access 22.8R1.4 and later. Until patches are applied, implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. Educate users about the dangers of clicking untrusted links, especially when logged into Ivanti portals. Employ multi-factor authentication (MFA) to limit the impact of session hijacking. Monitor logs for unusual activity indicative of CSRF exploitation attempts, such as unexpected configuration changes or unauthorized actions. Network segmentation and limiting administrative access to Ivanti interfaces can reduce exposure. Regularly review and update security policies to detect and respond to suspicious behavior. Finally, coordinate with Ivanti support for any additional recommended mitigations or hotfixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-07T16:15:48.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c04a24f67a6277124b5f9e

Added to database: 9/9/2025, 3:39:16 PM

Last enriched: 2/27/2026, 3:48:03 AM

Last updated: 3/28/2026, 6:34:47 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses