Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Edmunds small luxury SUV test: 2025 Acura ADX vs 2025 BMW X1

July 30, 2025

How composting works wherever you live

July 30, 2025

PHOTO ESSAY: A rickshaw driver and his dog are winning hearts in Nepal’s Kathmandu

July 30, 2025
Facebook X (Twitter) Instagram
Trending
  • Edmunds small luxury SUV test: 2025 Acura ADX vs 2025 BMW X1
  • How composting works wherever you live
  • PHOTO ESSAY: A rickshaw driver and his dog are winning hearts in Nepal’s Kathmandu
  • Female tour guides in Afghanistan lead women-only groups as some travelers return
  • Starbucks looks to protein drinks, other new products to turn around lagging sales
  • How Larry Ellison And David Ellison Pulled Off The Paramount Deal
  • Tracee Ellis Ross offers tips on solo travel in new docuseries for Roku
  • Booker Prize winner Kiran Desai is up for the award again with a long-awaited novel
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, July 30
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle
Cybersecurity

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

adminBy adminApril 11, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 53


Security researchers at Rapid7 are publicly documenting a path to remote code execution of a critical flaw in Ivanti’s Connect Secure VPN appliances, ramping up the urgency for organizations to apply available patches.

The publication of exploit code comes less than a week after Mandiant flagged in-the-wild exploitation of the Ivanti bug (CVE-2025-22457) by a Chinese hacking gang notorious for hacking into edge network devices.

Although the issue was patched back in February, Ivanti misdiagnosed the issue as a so-called “product bug” and failed to issue a CVE identifier with public documentation. It wasn’t until Mandiant’s incident response team discovered the Chinese hacking campaign that Ivanti pushed out an advisory with details on the problem.

Here’s Ivanti’s explanation of the hiccup:

“The vulnerability is a buffer overflow with characters limited to periods and numbers, it was evaluated and determined not to be exploitable as remote code execution and didn’t meet the requirements of denial of service.” 

“However, Ivanti and our security partners have now learned the vulnerability is exploitable through sophisticated means and have identified evidence of active exploitation in the wild. We encourage all customers to ensure they are running Ivanti Connect Secure 22.7R2.6 as soon as possible, which remediates the vulnerability.” 

A week after the public disclosure, Rapid7s researchers warn that attackers can use a few carefully crafted HTTP headers to escalate the exploit from a trivial crash to full-blown remote code execution.

According to Rapid7’s technical analysis, the vulnerability stems from an unchecked buffer overflow in the HTTP(S) web server component of the Ivanti Connect Secure software. The researchers traced the vulnerability to a function that processes the “X-Forwarded-For” header and by  manipulating the length of the header value, they were able to trigger an overflow that overwrites key parts of the stack. 

Advertisement. Scroll to continue reading.

“This is a salient reminder that state-sponsored threat actors are actively reverse engineering vendor patches for high-profile software targets, and are able to identify silently patched (or otherwise not publicly disclosed) vulnerabilities,” Rapid7 warned.

“For reference, it took us approximately 4 business days of work to go from an initial crash to RCE,” the company added.

“State-sponsored threat actors have both significant time and expertise to develop nuanced and complex exploits against high-profile targets. This highlights what is arguably an asymmetry between threat actor resources and capabilities, and technology producer resources and capabilities when making impact judgments about potential security issues.”

The vulnerability, which carries a CVSS severity score of 9/10, affects Ivanti Connect Secure versions 22.7R2.5 and earlier, as well as end-of-support Pulse Connect Secure 9.x.

Beyond Ivanti Connect Secure, Ivanti plans to release patches for its Policy Secure and ZTA Gateways. While the Policy Secure fix is slated for release on April 21 and the ZTA Gateways update on April 19, neither platform has yet been observed under active attack. 

Ivanti customers are urged to update to Connect Secure version 22.7R2.6 without delay and to migrate away from unsupported Pulse Connect Secure appliances.   

Rapid7 has joined Ivanti in recommending that organizations examine appliances for web server crashes that offer a useful indication of attempted exploitation. 

“This is due to how the exploit, in lieu of a suitable info leak to break ASLR, must rely upon brute forcing an address of a shared object library in the web server process. Every failed attempt to guess the correct address will result in the web server process crashing, and subsequently restarting,” Rapid7 noted.

Related: CISA Sets 48-Hour Deadline for Removal of Insecure Ivanti Products

Related: Details on Ivanti Exploits Chains: What Network Defenders Need to Know

Related: Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product 

Related: Ivanti CEO Vows Cybersecurity Makeover After Zero-Day Blitz

Related: CISA Issues Emergency Directive on Ivanti Zero-Days



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

How Larry Ellison And David Ellison Pulled Off The Paramount Deal

July 29, 2025

David Ellison, son of software centi-billionaire Larry Ellison, nurtured a relationship with Paramount over the…

The Founder Of Shake Shack Is Now A Billionaire

July 26, 2025

‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires

July 25, 2025

How Jeffrey Epstein Got So Rich

July 25, 2025
Our Picks

Edmunds small luxury SUV test: 2025 Acura ADX vs 2025 BMW X1

July 30, 2025

How composting works wherever you live

July 30, 2025

PHOTO ESSAY: A rickshaw driver and his dog are winning hearts in Nepal’s Kathmandu

July 30, 2025

Female tour guides in Afghanistan lead women-only groups as some travelers return

July 30, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.