Skip to main content

CVE-2025-8711: CWE-352 Cross-Site Request Forgery (CSRF) in Ivanti Connect Secure

Medium
VulnerabilityCVE-2025-8711cvecve-2025-8711cwe-352
Published: Tue Sep 09 2025 (09/09/2025, 15:17:25 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Connect Secure

Description

CSRF in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to execute limited actions on behalf of the victim user. User interaction is required.

AI-Powered Analysis

AILast updated: 09/09/2025, 15:31:12 UTC

Technical Analysis

CVE-2025-8711 is a Cross-Site Request Forgery (CSRF) vulnerability affecting multiple Ivanti products, including Ivanti Connect Secure (versions before 22.7R2.9 or 22.8R2), Ivanti Policy Secure (before 22.7R1.6), Ivanti ZTA Gateway (before 2.8R2.3-723), and Ivanti Neurons for Secure Access (before 22.8R1.4). This vulnerability allows a remote unauthenticated attacker to trick an authenticated user into executing limited actions on their behalf without their consent. The attack requires user interaction, typically by enticing the victim to visit a malicious website or click a crafted link. The vulnerability stems from insufficient anti-CSRF protections in the affected Ivanti products, which are commonly used for secure remote access and policy enforcement in enterprise environments. The CVSS v3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires no privileges, but does require user interaction. The impact primarily affects confidentiality and integrity, as unauthorized actions could lead to information disclosure or unauthorized changes in the system, but does not affect availability. No known exploits are reported in the wild as of now, and patches were deployed on August 2, 2025. Organizations using affected Ivanti products should prioritize patching to mitigate this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-8711 can be significant, especially for those relying on Ivanti Connect Secure and related products for remote access and secure policy management. Successful exploitation could allow attackers to perform unauthorized actions on behalf of legitimate users, potentially leading to unauthorized data access or configuration changes. This could compromise sensitive corporate data, violate data protection regulations such as GDPR, and undermine trust in secure access infrastructure. Given the widespread adoption of Ivanti products in sectors like finance, healthcare, government, and critical infrastructure across Europe, the vulnerability poses a risk to confidentiality and integrity of sensitive information. However, since exploitation requires user interaction and only limited actions can be performed, the overall impact is somewhat constrained but still notable in environments with high-value targets or stringent compliance requirements.

Mitigation Recommendations

To mitigate CVE-2025-8711, European organizations should: 1) Immediately apply the patches released on August 2, 2025, for all affected Ivanti products to ensure the vulnerability is remediated. 2) Implement strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks by limiting cross-origin requests. 3) Educate users about the risks of clicking on unsolicited links or visiting untrusted websites, as user interaction is required for exploitation. 4) Employ multi-factor authentication (MFA) to reduce the impact of unauthorized actions if credentials are compromised. 5) Monitor logs and network traffic for unusual activity indicative of CSRF exploitation attempts, such as unexpected configuration changes or access patterns. 6) Where possible, restrict access to Ivanti management interfaces to trusted networks or VPNs to reduce exposure to remote attackers. 7) Regularly review and update security policies and incident response plans to include CSRF attack scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-07T16:15:55.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0481fbd4e3b9088076677

Added to database: 9/9/2025, 3:30:39 PM

Last enriched: 9/9/2025, 3:31:12 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats