Security patches: Unauthorized access to Ivanti remote access solutions possible
Ivanti's developers have closed several vulnerabilities in Connect Secure and ZTA Gateways, among others.
(Image: Tatiana Popova/Shutterstock.com)
Attackers can target multiple vulnerabilities in Ivanti Connect Secure, Neurons for Secure Access, Policy Secure, and ZTA Gateways to attack systems.
Securing instances
Admins use remote access solutions to control VPN and network access in companies, for example. To prevent unauthorized access to company networks, administrators should promptly install the security updates available for download. So far, there have been no reports of ongoing attacks.
According to a warning message, several vulnerabilities are classified as “high” (CVE-2025-55145, CVE-2025-55147, CVE-2025-55148, CVE-2025-55141, CVE-2025-55142). If attacks are successful, attackers can, among other things, execute their commands, gain control over HTML5 connections, or bend settings. For the latter, however, an attacker must already be an admin.
Videos by heise
It is not yet clear how attacks could actually take place. The developers assure us that the following versions are protected against the attacks described:
- Connect Secure 22.7R2.9 or 22.8R2
- Policy Secure 22.7R1.5
- Neurons for Secure Access security problem has been solved in the cloud. Admins do not need to do anything at this point.
- ZTA Gateways 22.8R2.3-724
In May of this year, there were attacks on Ivantis Endpoint Manager Mobile (EPMM).
(des)