CVE-2025-55147: CWE-352 Cross-Site Request Forgery (CSRF) in Ivanti Connect Secure
CSRF in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to execute sensitive actions on behalf of the victim user. User interaction is required
AI Analysis
Technical Summary
CVE-2025-55147 is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352, affecting Ivanti Connect Secure versions prior to 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723, and Ivanti Neurons for Secure Access before 22.8R1.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unintended actions on behalf of the user. In this case, the vulnerability allows a remote unauthenticated attacker to execute sensitive actions by leveraging the victim's authenticated session, provided the victim interacts with a maliciously crafted link or webpage. The vulnerability affects the confidentiality, integrity, and availability of the affected systems, as attackers can perform unauthorized operations that may lead to data exposure, modification, or service disruption. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The fix was released on August 2, 2025, but no public exploit code or active exploitation has been reported yet. The affected products are widely used in enterprise environments for secure remote access and policy enforcement, making this vulnerability critical to address promptly.
Potential Impact
The impact of CVE-2025-55147 is significant for organizations using Ivanti's secure access and policy enforcement products. Successful exploitation can lead to unauthorized execution of sensitive actions, potentially compromising user credentials, exposing confidential data, altering security policies, or disrupting service availability. Since the attacker does not require authentication and only needs to trick a user into interacting with a malicious link, the attack surface is broad, especially in environments with remote or hybrid workforces. This can lead to lateral movement within networks, privilege escalation, or persistent access. The compromise of secure access gateways can undermine the entire security posture of an organization, exposing internal resources to attackers. Additionally, the vulnerability's presence in multiple Ivanti products increases the risk of widespread impact across different organizational layers. The absence of known exploits in the wild currently provides a window for mitigation, but the high CVSS score underscores the urgency for remediation.
Mitigation Recommendations
Organizations should immediately verify their Ivanti product versions and upgrade to the patched releases: Connect Secure 22.7R2.9 or 22.8R2 and later, Policy Secure 22.7R1.6 and later, ZTA Gateway 2.8R2.3-723 and later, and Neurons for Secure Access 22.8R1.4 and later. Until patches are applied, implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. Educate users about the dangers of clicking untrusted links, especially when logged into Ivanti portals. Employ multi-factor authentication (MFA) to limit the impact of session hijacking. Monitor logs for unusual activity indicative of CSRF exploitation attempts, such as unexpected configuration changes or unauthorized actions. Network segmentation and limiting administrative access to Ivanti interfaces can reduce exposure. Regularly review and update security policies to detect and respond to suspicious behavior. Finally, coordinate with Ivanti support for any additional recommended mitigations or hotfixes.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Japan, Netherlands, South Korea, India, Singapore
CVE-2025-55147: CWE-352 Cross-Site Request Forgery (CSRF) in Ivanti Connect Secure
Description
CSRF in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to execute sensitive actions on behalf of the victim user. User interaction is required
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55147 is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352, affecting Ivanti Connect Secure versions prior to 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723, and Ivanti Neurons for Secure Access before 22.8R1.4. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unintended actions on behalf of the user. In this case, the vulnerability allows a remote unauthenticated attacker to execute sensitive actions by leveraging the victim's authenticated session, provided the victim interacts with a maliciously crafted link or webpage. The vulnerability affects the confidentiality, integrity, and availability of the affected systems, as attackers can perform unauthorized operations that may lead to data exposure, modification, or service disruption. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The fix was released on August 2, 2025, but no public exploit code or active exploitation has been reported yet. The affected products are widely used in enterprise environments for secure remote access and policy enforcement, making this vulnerability critical to address promptly.
Potential Impact
The impact of CVE-2025-55147 is significant for organizations using Ivanti's secure access and policy enforcement products. Successful exploitation can lead to unauthorized execution of sensitive actions, potentially compromising user credentials, exposing confidential data, altering security policies, or disrupting service availability. Since the attacker does not require authentication and only needs to trick a user into interacting with a malicious link, the attack surface is broad, especially in environments with remote or hybrid workforces. This can lead to lateral movement within networks, privilege escalation, or persistent access. The compromise of secure access gateways can undermine the entire security posture of an organization, exposing internal resources to attackers. Additionally, the vulnerability's presence in multiple Ivanti products increases the risk of widespread impact across different organizational layers. The absence of known exploits in the wild currently provides a window for mitigation, but the high CVSS score underscores the urgency for remediation.
Mitigation Recommendations
Organizations should immediately verify their Ivanti product versions and upgrade to the patched releases: Connect Secure 22.7R2.9 or 22.8R2 and later, Policy Secure 22.7R1.6 and later, ZTA Gateway 2.8R2.3-723 and later, and Neurons for Secure Access 22.8R1.4 and later. Until patches are applied, implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF risks. Educate users about the dangers of clicking untrusted links, especially when logged into Ivanti portals. Employ multi-factor authentication (MFA) to limit the impact of session hijacking. Monitor logs for unusual activity indicative of CSRF exploitation attempts, such as unexpected configuration changes or unauthorized actions. Network segmentation and limiting administrative access to Ivanti interfaces can reduce exposure. Regularly review and update security policies to detect and respond to suspicious behavior. Finally, coordinate with Ivanti support for any additional recommended mitigations or hotfixes.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ivanti
- Date Reserved
- 2025-08-07T16:15:48.897Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c04a24f67a6277124b5f9e
Added to database: 9/9/2025, 3:39:16 PM
Last enriched: 2/27/2026, 3:48:03 AM
Last updated: 3/28/2026, 6:34:47 AM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.