Skip to main content

CVE-2025-8310: CWE-862 Missing Authorization in Ivanti Virtual Application Delivery ControllerCWE-862

Medium
VulnerabilityCVE-2025-8310cvecve-2025-8310cwe-862
Published: Tue Aug 12 2025 (08/12/2025, 14:42:31 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Virtual Application Delivery ControllerCWE-862

Description

Missing authorization in the admin console of Ivanti Virtual Application Delivery Controller before version 22.9 allows a remote authenticated attacker to take over admin accounts by resetting the password

AI-Powered Analysis

AILast updated: 08/20/2025, 02:14:55 UTC

Technical Analysis

CVE-2025-8310 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Ivanti Virtual Application Delivery Controller (VADC) prior to version 22.9. This vulnerability exists in the admin console of the product, where insufficient authorization controls allow a remote authenticated attacker to reset administrator account passwords without proper permission checks. The flaw enables an attacker who has some level of authenticated access—though not necessarily administrative privileges—to escalate their privileges by taking over admin accounts. This can lead to a complete compromise of the VADC device, which is critical infrastructure for application delivery and load balancing. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction is needed (likely to authenticate initially). The impact is high on integrity since attackers can modify admin credentials, but confidentiality and availability impacts are not directly indicated. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability highlights a failure in enforcing authorization checks on sensitive password reset functionality within the admin console, which is a critical security control failure in enterprise-grade application delivery infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for enterprises relying on Ivanti VADC for secure application delivery, load balancing, and access control. Successful exploitation allows attackers to gain administrative control over the VADC, potentially enabling them to manipulate traffic flows, intercept or redirect sensitive data, and disrupt application availability indirectly. This could lead to data integrity breaches, unauthorized access to internal applications, and lateral movement within corporate networks. Given that many European organizations operate under strict data protection regulations such as GDPR, a compromise of this nature could result in regulatory penalties and reputational damage. Additionally, sectors with critical infrastructure or sensitive data—such as finance, healthcare, and government—may face heightened risks. The requirement for initial authentication reduces the risk somewhat, but insider threats or compromised low-privilege accounts could be leveraged by attackers to exploit this vulnerability.

Mitigation Recommendations

Organizations should prioritize upgrading Ivanti Virtual Application Delivery Controller to version 22.9 or later once available, as this version addresses the missing authorization issue. Until patches are released, administrators should implement strict access controls to limit who can authenticate to the admin console, including enforcing multi-factor authentication (MFA) for all users with any level of access. Network segmentation should be applied to restrict access to the admin console only to trusted management networks or VPNs. Monitoring and logging of admin console access and password reset activities should be enhanced to detect suspicious behavior promptly. Additionally, organizations should review and tighten role-based access controls (RBAC) within the VADC to minimize the number of users with password reset capabilities. If possible, temporarily disable remote access to the admin console or restrict it to specific IP addresses. Finally, organizations should prepare incident response plans to quickly address any suspected compromise of admin accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-07-29T14:57:06.295Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b5415ad5a09ad00335157

Added to database: 8/12/2025, 2:47:49 PM

Last enriched: 8/20/2025, 2:14:55 AM

Last updated: 8/20/2025, 10:48:59 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats