Ivanti warns hackers are exploiting new vulnerability

Avatar

IT software vendor Ivanti said Wednesday that multiple customers have been affected by a new vulnerability being exploited by hackers. 

The company released an advisory and a corresponding blog about two bugs — CVE-2025-0282 and CVE-2025-0283 — and warned that some customers have already seen CVE-2025-0282 exploited in their environments.

The bugs affect the company’s Connect Secure, Policy Secure and ZTA Gateways products — all of which are used widely across local and federal government agencies in the U.S. as well as internationally. 

“We are aware of a limited number of customers’ Ivanti Connect Secure appliances which have been exploited by CVE-2025-0282 at the time of disclosure. We are not aware of these CVEs being exploited in Ivanti Policy Secure or Neurons for ZTA gateways,” Ivanti said in a statement, adding that it has not seen exploitation of CVE-2025-0283.

Ivanti said a patch is currently available for Connect Secure but patches for Policy Secure and ZTA Gateway are slated for release on January 21. 

The U.K.’s National Cyber Security Centre (NCSC) published its own advisory warning of “active exploitation.”

“The NCSC is working to fully understand the UK impact and investigating cases of active exploitation affecting UK networks,” the agency said. 

Customers can see if they have been attacked through an Integrity Checker Tool (ICT), and can safely upgrade to the latest version of the software if they find no evidence of exploitation. If exploitation is found customers should perform a factory reset on the appliance to ensure any malware is removed, Ivanti said. 

The company urged customers not to expose any of their devices to the internet, something federal cybersecurity agencies have also previously warned organizations against. 

Ivanti said the bugs were initially discovered by cybersecurity firm Mandiant and security experts at Microsoft. 

“We continue to work closely with affected customers, external security partners, and law enforcement agencies as we respond to this threat,” the company said. 

“This incident serves as a reminder of the importance of continuous monitoring and proactive and layered security measures, particularly for edge devices (such as VPNs) which provide an essential service as the initial access point to a corporate network – but which are also highly appealing to attackers.”

Ivanti said it will provide more information about the threat actor activity to customers that have confirmed impact. 

Last April, the company pledged a security overhaul after a cascade of headline-grabbing nation-state attacks broke through the systems of government agencies in the U.S. and Europe using vulnerabilities in Ivanti products. 

By September, the top cyber watchdogs in the U.S. urged federal agencies to either remove or upgrade certain Ivanti appliances that are no longer being updated and that were previously exploited in attacks.

CybercrimeGovernmentNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Pall Mall Process to tackle commercial hacking proliferation raises more concerns than solutions

Next Post

Casio warns employees, customers about data leak from October ransomware attack

Related Posts

U.S. Judge Rules Against NSO Group in WhatsApp Pegasus Spyware Case

Meta Platforms-owned WhatsApp scored a major legal victory in its fight against Israeli commercial spyware vendor NSO Group after a federal judge in the U.S. state of California ruled in favor of the messaging giant for exploiting a security vulnerability to deliver Pegasus. "The limited evidentiary record before the court does show that defendants' Pegasus code was sent through plaintiffs'
Avatar
Read More