Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

What a Federal Reserve rate cut means for your finances

October 29, 2025

Character.AI to ban minors from using its chatbots

October 29, 2025

A recipe for Fish Stick Panzanella from ‘The Blue Food Cookbook’

October 29, 2025
Facebook X (Twitter) Instagram
Trending
  • What a Federal Reserve rate cut means for your finances
  • Character.AI to ban minors from using its chatbots
  • A recipe for Fish Stick Panzanella from ‘The Blue Food Cookbook’
  • Zimmern and Seaver promote fish and seafood in the ‘Blue Food Cookbook’
  • NFL fans want a longer season, new poll finds
  • Edmunds compares the new BMW X3 and Mercedes-Benz GLC
  • German exhibition explores history of fragrance
  • Jim Morrison’s historic ski descent on Mount Everest’s most dangerous run
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, October 29
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle
Cybersecurity

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

By adminApril 11, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 94


Security researchers at Rapid7 are publicly documenting a path to remote code execution of a critical flaw in Ivanti’s Connect Secure VPN appliances, ramping up the urgency for organizations to apply available patches.

The publication of exploit code comes less than a week after Mandiant flagged in-the-wild exploitation of the Ivanti bug (CVE-2025-22457) by a Chinese hacking gang notorious for hacking into edge network devices.

Although the issue was patched back in February, Ivanti misdiagnosed the issue as a so-called “product bug” and failed to issue a CVE identifier with public documentation. It wasn’t until Mandiant’s incident response team discovered the Chinese hacking campaign that Ivanti pushed out an advisory with details on the problem.

Here’s Ivanti’s explanation of the hiccup:

“The vulnerability is a buffer overflow with characters limited to periods and numbers, it was evaluated and determined not to be exploitable as remote code execution and didn’t meet the requirements of denial of service.” 

“However, Ivanti and our security partners have now learned the vulnerability is exploitable through sophisticated means and have identified evidence of active exploitation in the wild. We encourage all customers to ensure they are running Ivanti Connect Secure 22.7R2.6 as soon as possible, which remediates the vulnerability.” 

A week after the public disclosure, Rapid7s researchers warn that attackers can use a few carefully crafted HTTP headers to escalate the exploit from a trivial crash to full-blown remote code execution.

According to Rapid7’s technical analysis, the vulnerability stems from an unchecked buffer overflow in the HTTP(S) web server component of the Ivanti Connect Secure software. The researchers traced the vulnerability to a function that processes the “X-Forwarded-For” header and by  manipulating the length of the header value, they were able to trigger an overflow that overwrites key parts of the stack. 

Advertisement. Scroll to continue reading.

“This is a salient reminder that state-sponsored threat actors are actively reverse engineering vendor patches for high-profile software targets, and are able to identify silently patched (or otherwise not publicly disclosed) vulnerabilities,” Rapid7 warned.

“For reference, it took us approximately 4 business days of work to go from an initial crash to RCE,” the company added.

“State-sponsored threat actors have both significant time and expertise to develop nuanced and complex exploits against high-profile targets. This highlights what is arguably an asymmetry between threat actor resources and capabilities, and technology producer resources and capabilities when making impact judgments about potential security issues.”

The vulnerability, which carries a CVSS severity score of 9/10, affects Ivanti Connect Secure versions 22.7R2.5 and earlier, as well as end-of-support Pulse Connect Secure 9.x.

Beyond Ivanti Connect Secure, Ivanti plans to release patches for its Policy Secure and ZTA Gateways. While the Policy Secure fix is slated for release on April 21 and the ZTA Gateways update on April 19, neither platform has yet been observed under active attack. 

Ivanti customers are urged to update to Connect Secure version 22.7R2.6 without delay and to migrate away from unsupported Pulse Connect Secure appliances.   

Rapid7 has joined Ivanti in recommending that organizations examine appliances for web server crashes that offer a useful indication of attempted exploitation. 

“This is due to how the exploit, in lieu of a suitable info leak to break ASLR, must rely upon brute forcing an address of a shared object library in the web server process. Every failed attempt to guess the correct address will result in the web server process crashing, and subsequently restarting,” Rapid7 noted.

Related: CISA Sets 48-Hour Deadline for Removal of Insecure Ivanti Products

Related: Details on Ivanti Exploits Chains: What Network Defenders Need to Know

Related: Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product 

Related: Ivanti CEO Vows Cybersecurity Makeover After Zero-Day Blitz

Related: CISA Issues Emergency Directive on Ivanti Zero-Days



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply

Don't Miss
Billionaires

Trump Donor Tim Mellon Has Likely Donated More Than Half His Fortune To Politics

October 28, 2025

Timothy Mellon and his first wife Susan Tracy Mellon attend a party in 1981—the year…

Billionaire Kwek Leng Beng’s CDL Sells 84% Of Residential Towers Amid Singapore Property Boom

October 27, 2025

Here’s All The Vineyards, Restaurants And Properties In Which Gavin Newsom Owns Stakes

October 26, 2025

These Are The Billionaires Cutting Checks To Stop Zohran Mamdani

October 24, 2025
Our Picks

What a Federal Reserve rate cut means for your finances

October 29, 2025

Character.AI to ban minors from using its chatbots

October 29, 2025

A recipe for Fish Stick Panzanella from ‘The Blue Food Cookbook’

October 29, 2025

Zimmern and Seaver promote fish and seafood in the ‘Blue Food Cookbook’

October 29, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.