CVE-2025-8712: CWE-862 Missing Authorization in Ivanti Connect Secure before
Missing authorization in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with read-only admin privileges to configure restricted settings.
AI Analysis
Technical Summary
CVE-2025-8712 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting multiple Ivanti products, including Ivanti Connect Secure (versions before 22.7R2.9 or 22.8R2), Ivanti Policy Secure (before 22.7R1.6), Ivanti ZTA Gateway (before 22.8R2.3-723), and Ivanti Neurons for Secure Access (before 22.8R1.4). The vulnerability allows a remote attacker who has authenticated with read-only administrative privileges to bypass authorization controls and configure restricted settings that should normally be inaccessible. This flaw arises due to improper enforcement of authorization checks, enabling privilege escalation within the administrative interface. The vulnerability does not require user interaction and can be exploited remotely over the network, with a low attack complexity. The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild, and patches were deployed on August 2, 2025. The affected Ivanti products are widely used in enterprise environments for secure remote access, policy enforcement, and zero-trust access management, making this vulnerability significant for organizations relying on these solutions for network security and access control.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized configuration changes by attackers who have obtained read-only admin credentials, potentially leading to weakened security postures, exposure of sensitive data, or disruption of secure access policies. Since Ivanti products are commonly deployed in sectors such as finance, healthcare, government, and critical infrastructure across Europe, exploitation could result in unauthorized access escalation, data leakage, or compliance violations under regulations like GDPR. The ability to modify restricted settings without full admin privileges could allow attackers to disable security controls, create backdoors, or manipulate access policies, increasing the risk of subsequent attacks or insider threats. Although the vulnerability does not directly impact availability, the integrity and confidentiality of sensitive configurations and data are at risk, which could have cascading effects on organizational security and trust.
Mitigation Recommendations
European organizations should immediately verify the versions of Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access in use and apply the official patches released on August 2, 2025. In addition to patching, organizations should implement strict access controls and monitoring for administrative accounts, especially those with read-only privileges, to detect unusual configuration changes. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Conduct regular audits of configuration changes and review logs for unauthorized modifications. Network segmentation should be enforced to limit exposure of Ivanti management interfaces to trusted networks only. Finally, organizations should update incident response plans to include scenarios involving unauthorized configuration changes and train security teams to recognize signs of exploitation related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2025-8712: CWE-862 Missing Authorization in Ivanti Connect Secure before
Description
Missing authorization in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with read-only admin privileges to configure restricted settings.
AI-Powered Analysis
Technical Analysis
CVE-2025-8712 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting multiple Ivanti products, including Ivanti Connect Secure (versions before 22.7R2.9 or 22.8R2), Ivanti Policy Secure (before 22.7R1.6), Ivanti ZTA Gateway (before 22.8R2.3-723), and Ivanti Neurons for Secure Access (before 22.8R1.4). The vulnerability allows a remote attacker who has authenticated with read-only administrative privileges to bypass authorization controls and configure restricted settings that should normally be inaccessible. This flaw arises due to improper enforcement of authorization checks, enabling privilege escalation within the administrative interface. The vulnerability does not require user interaction and can be exploited remotely over the network, with a low attack complexity. The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild, and patches were deployed on August 2, 2025. The affected Ivanti products are widely used in enterprise environments for secure remote access, policy enforcement, and zero-trust access management, making this vulnerability significant for organizations relying on these solutions for network security and access control.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized configuration changes by attackers who have obtained read-only admin credentials, potentially leading to weakened security postures, exposure of sensitive data, or disruption of secure access policies. Since Ivanti products are commonly deployed in sectors such as finance, healthcare, government, and critical infrastructure across Europe, exploitation could result in unauthorized access escalation, data leakage, or compliance violations under regulations like GDPR. The ability to modify restricted settings without full admin privileges could allow attackers to disable security controls, create backdoors, or manipulate access policies, increasing the risk of subsequent attacks or insider threats. Although the vulnerability does not directly impact availability, the integrity and confidentiality of sensitive configurations and data are at risk, which could have cascading effects on organizational security and trust.
Mitigation Recommendations
European organizations should immediately verify the versions of Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access in use and apply the official patches released on August 2, 2025. In addition to patching, organizations should implement strict access controls and monitoring for administrative accounts, especially those with read-only privileges, to detect unusual configuration changes. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Conduct regular audits of configuration changes and review logs for unauthorized modifications. Network segmentation should be enforced to limit exposure of Ivanti management interfaces to trusted networks only. Finally, organizations should update incident response plans to include scenarios involving unauthorized configuration changes and train security teams to recognize signs of exploitation related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ivanti
- Date Reserved
- 2025-08-07T16:15:56.461Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c0456a12a58f153632f07f
Added to database: 9/9/2025, 3:19:06 PM
Last enriched: 9/9/2025, 3:19:51 PM
Last updated: 9/9/2025, 3:52:25 PM
Views: 3
Related Threats
CVE-2025-55050: CWE-1242 in Baicells NOVA430e/430i, NOVA436Q, NEUTRINO430, NOVA846
CriticalCVE-2025-57060: n/a
HighCVE-2025-55730: CWE-116: Improper Encoding or Escaping of Output in xwikisas xwiki-pro-macros
CriticalCVE-2025-55729: CWE-116: Improper Encoding or Escaping of Output in xwikisas xwiki-pro-macros
CriticalCVE-2025-55049: CWE-1394 in Baicells NEUTRINO430
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.