Skip to main content

CVE-2025-8712: CWE-862 Missing Authorization in Ivanti Connect Secure before

Medium
VulnerabilityCVE-2025-8712cvecve-2025-8712cwe-862
Published: Tue Sep 09 2025 (09/09/2025, 15:12:38 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Connect Secure before

Description

Missing authorization in Ivanti Connect Secure before 22.7R2.9 or 22.8R2, Ivanti Policy Secure before 22.7R1.6, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with read-only admin privileges to configure restricted settings.

AI-Powered Analysis

AILast updated: 09/09/2025, 15:19:51 UTC

Technical Analysis

CVE-2025-8712 is a medium-severity vulnerability classified under CWE-862 (Missing Authorization) affecting multiple Ivanti products, including Ivanti Connect Secure (versions before 22.7R2.9 or 22.8R2), Ivanti Policy Secure (before 22.7R1.6), Ivanti ZTA Gateway (before 22.8R2.3-723), and Ivanti Neurons for Secure Access (before 22.8R1.4). The vulnerability allows a remote attacker who has authenticated with read-only administrative privileges to bypass authorization controls and configure restricted settings that should normally be inaccessible. This flaw arises due to improper enforcement of authorization checks, enabling privilege escalation within the administrative interface. The vulnerability does not require user interaction and can be exploited remotely over the network, with a low attack complexity. The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild, and patches were deployed on August 2, 2025. The affected Ivanti products are widely used in enterprise environments for secure remote access, policy enforcement, and zero-trust access management, making this vulnerability significant for organizations relying on these solutions for network security and access control.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized configuration changes by attackers who have obtained read-only admin credentials, potentially leading to weakened security postures, exposure of sensitive data, or disruption of secure access policies. Since Ivanti products are commonly deployed in sectors such as finance, healthcare, government, and critical infrastructure across Europe, exploitation could result in unauthorized access escalation, data leakage, or compliance violations under regulations like GDPR. The ability to modify restricted settings without full admin privileges could allow attackers to disable security controls, create backdoors, or manipulate access policies, increasing the risk of subsequent attacks or insider threats. Although the vulnerability does not directly impact availability, the integrity and confidentiality of sensitive configurations and data are at risk, which could have cascading effects on organizational security and trust.

Mitigation Recommendations

European organizations should immediately verify the versions of Ivanti Connect Secure, Policy Secure, ZTA Gateway, and Neurons for Secure Access in use and apply the official patches released on August 2, 2025. In addition to patching, organizations should implement strict access controls and monitoring for administrative accounts, especially those with read-only privileges, to detect unusual configuration changes. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Conduct regular audits of configuration changes and review logs for unauthorized modifications. Network segmentation should be enforced to limit exposure of Ivanti management interfaces to trusted networks only. Finally, organizations should update incident response plans to include scenarios involving unauthorized configuration changes and train security teams to recognize signs of exploitation related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-07T16:15:56.461Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0456a12a58f153632f07f

Added to database: 9/9/2025, 3:19:06 PM

Last enriched: 9/9/2025, 3:19:51 PM

Last updated: 9/9/2025, 3:52:25 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats