Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle
  • Security Week

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

Ryan Naraine Published: April 11, 2025 | Updated: April 11, 2025 3 min read
0 views

Security researchers at Rapid7 are publicly documenting a path to remote code execution of a critical flaw in Ivanti’s Connect Secure VPN appliances, ramping up the urgency for organizations to apply available patches.

The publication of exploit code comes less than a week after Mandiant flagged in-the-wild exploitation of the Ivanti bug (CVE-2025-22457) by a Chinese hacking gang notorious for hacking into edge network devices.

Although the issue was patched back in February, Ivanti misdiagnosed the issue as a so-called “product bug” and failed to issue a CVE identifier with public documentation. It wasn’t until Mandiant’s incident response team discovered the Chinese hacking campaign that Ivanti pushed out an advisory with details on the problem.

Here’s Ivanti’s explanation of the hiccup:

“The vulnerability is a buffer overflow with characters limited to periods and numbers, it was evaluated and determined not to be exploitable as remote code execution and didn’t meet the requirements of denial of service.” 

“However, Ivanti and our security partners have now learned the vulnerability is exploitable through sophisticated means and have identified evidence of active exploitation in the wild. We encourage all customers to ensure they are running Ivanti Connect Secure 22.7R2.6 as soon as possible, which remediates the vulnerability.” 

A week after the public disclosure, Rapid7s researchers warn that attackers can use a few carefully crafted HTTP headers to escalate the exploit from a trivial crash to full-blown remote code execution.

According to Rapid7’s technical analysis, the vulnerability stems from an unchecked buffer overflow in the HTTP(S) web server component of the Ivanti Connect Secure software. The researchers traced the vulnerability to a function that processes the “X-Forwarded-For” header and by  manipulating the length of the header value, they were able to trigger an overflow that overwrites key parts of the stack. 

Advertisement. Scroll to continue reading.

“This is a salient reminder that state-sponsored threat actors are actively reverse engineering vendor patches for high-profile software targets, and are able to identify silently patched (or otherwise not publicly disclosed) vulnerabilities,” Rapid7 warned.

“For reference, it took us approximately 4 business days of work to go from an initial crash to RCE,” the company added.

“State-sponsored threat actors have both significant time and expertise to develop nuanced and complex exploits against high-profile targets. This highlights what is arguably an asymmetry between threat actor resources and capabilities, and technology producer resources and capabilities when making impact judgments about potential security issues.”

The vulnerability, which carries a CVSS severity score of 9/10, affects Ivanti Connect Secure versions 22.7R2.5 and earlier, as well as end-of-support Pulse Connect Secure 9.x.

Beyond Ivanti Connect Secure, Ivanti plans to release patches for its Policy Secure and ZTA Gateways. While the Policy Secure fix is slated for release on April 21 and the ZTA Gateways update on April 19, neither platform has yet been observed under active attack. 

Ivanti customers are urged to update to Connect Secure version 22.7R2.6 without delay and to migrate away from unsupported Pulse Connect Secure appliances.   

Rapid7 has joined Ivanti in recommending that organizations examine appliances for web server crashes that offer a useful indication of attempted exploitation. 

“This is due to how the exploit, in lieu of a suitable info leak to break ASLR, must rely upon brute forcing an address of a shared object library in the web server process. Every failed attempt to guess the correct address will result in the web server process crashing, and subsequently restarting,” Rapid7 noted.

Related: CISA Sets 48-Hour Deadline for Removal of Insecure Ivanti Products

Related: Details on Ivanti Exploits Chains: What Network Defenders Need to Know

Related: Ivanti Warns of New Zero-Day Attacks Hitting Connect Secure Product 

Related: Ivanti CEO Vows Cybersecurity Makeover After Zero-Day Blitz

Related: CISA Issues Emergency Directive on Ivanti Zero-Days

About The Author

Ryan Naraine

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Hackers Breach Morocco’s Social Security Database
Next: Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Author's Other Posts

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities Cybersecurity_News-SecurityWeek.jpg

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities

April 14, 2025 0 0
Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed Nvidia.jpeg

Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed

April 14, 2025 0 1
Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs White-House-Cybersecurity.jpg

Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs

April 10, 2025 0 0
Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools Cybersecurity-Teams.jpg

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools

April 9, 2025 0 1

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.