Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

CISA Urges Patching For ‘Critical’ Ivanti VPN Flaw Exploited In Attacks

CRN by CRN
April 4, 2025
Home News
Share on FacebookShare on Twitter


Exploitation of the Ivanti Connect Secure vulnerability may be linked to a China-based espionage group, according to Mandiant researchers.

A critical-severity vulnerability in Ivanti’s Connect Secure VPN that has seen exploitation in recent cyberattacks should be fixed with available patches as soon as possible, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said Friday.

The flaw (tracked at CVE-2025-22457) can be exploited to enable remote execution of code and researchers have identified “evidence of active exploitation in the wild,” researchers at Google Cloud-owned Mandiant said in a blog post.

[Related: 10 Major Ransomware Attacks And Data Breaches In 2024]

According to Mandiant, the attacks may be linked to a China-based espionage group that is believed to have been behind the mass exploitation of Ivanti Connect Secure devices in early 2024.

The group, UNC5221, is believed to have compromised thousands of Ivanti VPN devices during the wave of 2024 attacks, with the list of victims including CISA.

In the latest attacks targeting Ivanti VPN customers, deployment of an “ecosystem of malware attributed to UNC5221 was also observed,” Mandiant researchers wrote in the post.

The attacks are believed to have begun as far back as mid-March, according to the researchers.

CRN has reached out to Ivanti for comment.

In an advisory posted Thursday and updated Friday, Ivanti said it is “aware of a limited number of customers” exploited in the attacks.

The vulnerability affects Ivanti Connect Secure version 22.7R2.5 or earlier, as well as Pulse Connect Secure 9.1x devices that stopped receiving code support as of the end of 2024 due to reaching end-of-support, according to Ivanti.

A fixed version of Ivanti Connect Secure (22.7R2.6) has been available since Feb. 11, the company said. The vulnerability was addressed in the update after it was “initially identified as a product bug,” Ivanti said in its advisory.

Originally, the flaw was “evaluated and determined not to be exploitable as remote code execution,” the company said. “However, Ivanti and our security partners have now learned the vulnerability is exploitable through sophisticated means and have identified evidence of active exploitation in the wild.”

The vulnerability has received a “critical” severity rating of 9.0 out of 10.0.

CISA added the flaw to its catalog of vulnerabilities known to have seen exploitation in the wild Friday.

“These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” CISA said in its advisory.

While the order only applies to Federal Civilian Executive Branch agencies, CISA “strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of [such] vulnerabilities as part of their vulnerability management practice,” the agency said Friday.

In mid-January, attacks exploiting a previously disclosed critical vulnerability in Ivanti Connect Secure (tracked at CVE-2025-0282) were linked by Mandiant researchers to a China-based threat actor, tracked as UNC5337. The group may be part of UNC5221, the researchers said at the time.



Source link

Tags: CyberattacksCybersecurityVulnerabilities
CRN

CRN

Next Post
‘Confusion,’ ‘Uncertainty,’ ‘Pain’: Solution Providers Grapple With Trump’s Tariff Regime

‘Confusion,’ ‘Uncertainty,’ ‘Pain’: Solution Providers Grapple With Trump’s Tariff Regime

Recommended.

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

June 18, 2025
Accelerating Connectivity in the Asia-Pacific: ADC Submarine Cable Empowers the Digital Future

Accelerating Connectivity in the Asia-Pacific: ADC Submarine Cable Empowers the Digital Future

March 29, 2025

Trending.

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

VIDIZMO Earns Microsoft Solutions Partner Designations for All Three Areas of Azure, Solidifying its Expertise in Delivering AI Solutions

June 28, 2025
Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

Tilson Continues to Perform for Clients; Shares Substantial Progress in Chapter 11 Process

June 27, 2025
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

June 27, 2025
DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

June 23, 2025
Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

Le nombre d’utilisateurs de la 5G-A atteint les dix millions en Chine : Huawei présente le développement de la 5G-A et la valeur de l’IA basée sur des scénarios

June 27, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio