CVE-2025-0282
Published Jan 8, 2025
Last updated 5 months ago
- Description
- A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
- Source
- 3c1d8aa1-5a33-4ea4-8992-aadd6440af75
- NVD status
- Analyzed
- Products
- connect_secure, neurons_for_zero-trust_access, policy_secure
CVSS 3.1
- Type
- Primary
- Base score
- 9
- Impact score
- 6
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability
- Exploit added on
- Jan 8, 2025
- Exploit action due
- Jan 15, 2025
- Required action
- Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.
- Hype score
- Not currently trending
Badan Keamanan Siber dan Infrastruktur AS (CISA) telah merilis detail baru tentang RESURGE, sebuah perangkat lunak berbahaya yang digunakan dalam serangan zero-day yang mengeksploitasi CVE-2025-0282 untuk membobol perangkat Ivanti Connect Secure. #quantyxs #hypergaruda #cyber htt
@Quantyxs
13 Mar 2026
111 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Badan Keamanan Siber dan Infrastruktur AS (CISA) telah merilis detail baru tentang RESURGE, sebuah perangkat lunak berbahaya yang digunakan dalam serangan zero-day yang mengeksploitasi CVE-2025-0282 untuk membobol perangkat Ivanti Connect Secure. https://t.co/4P6WCXW4Pt
@Quantyxs
13 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0282 activity just exploded across our sensors. For weeks we saw ~500–1500 tries/day. In the last 48h that jumped to 10k+. When splitting by location, the spike is almost entirely targeting US infrastructure. Likely the vuln was automated or a better PoC is available
@LupovisDefence
5 Mar 2026
200 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
1 Quote
#RESURGE implant targets #IvantiConnectSecure via CVE-2025-0282, enabling covert SSH C2 and persistence within the native web server process. Evasion includes forged TLS certs and CRC32 fingerprinting; SPAWNSLOTH used for log tampering. https://t.co/3JkJe6wNCZ
@MeridianEU
4 Mar 2026
112 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Flags RESURGE Malware Exploiting Ivanti Connect Secure Flaw (CVE-2025-0282) CISA warns that RESURGE—an evolved SPAWNCHIMERA variant—leverages CVE-2025-0282 to plant web shells, harvest credentials, manipulate accounts, and persist by copying itself to the boot disk
@ThreatSynop
3 Mar 2026
132 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA warns RESURGE is exploiting Ivanti Connect Secure CVE-2025-0282 to take over gateways, drop web shells, steal creds, and persist. Patch now, reset credentials, and check for compromise. #CyberSecurity #Malware #Ivanti #CVE #PatchNow #ThreatIntel #Infosec #resurge https://t.c
@CloneSystemsInc
3 Mar 2026
98 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns RESURGE Implant Can Hide on Ivanti Connect Secure Until “Called” by the Attacker CISA details the RESURGE Linux LSO implant (`https://t.co/gcalHrqPnP`) used in zero-day exploitation of Ivanti Connect Secure (CVE-2025-0282), designed as a passive C2 that hooks
@ThreatSynop
2 Mar 2026
131 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices. https://t.co/Vf22EIYncV
@blackwired32799
2 Mar 2026
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA reveals RESURGE malware can stay dormant on Ivanti Connect Secure devices, exploiting CVE-2025-0282 with ECC encryption, forged TLS, and SSH tunnels to maintain stealthy, persistent access. #IvantiSecurity #MalwarePersistence #USA https://t.co/p8tqHOVUNm
@TweetThreatNews
2 Mar 2026
190 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
RESURGE Malware Exploits Ivanti Connect Secure (CVE-2025-0282) with Stealth In-Process Backdoor Recent analysis details a malware family dubbed RESURGE targeting compromised Ivanti Connect Secure appliances via CVE-2025-0282. Unlike conventional post-exploitation tooling,
@VivekIntel
2 Mar 2026
30 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Ivanti Connect Secureのゼロデイ脆弱性(CVE-2025-0282)を悪用して侵入するマルウェア「RESURGE」が、侵害を受けた機器ではパッチ適用後も休眠状態で残存しうることが明らかになっています。
@MalwareBibleJP
2 Mar 2026
1338 Impressions
1 Retweet
15 Likes
3 Bookmarks
0 Replies
0 Quotes
米CISAが、Ivantiデバイスを標的とするマルウェア「RESURGE」に関する新たな警告を発表しました。 このマルウェアは、Ivanti Connect Secureデバイスに存在するゼロデイ脆弱性「CVE-2025-0282」を悪用した攻撃で使われ
@omomuki_tech
1 Mar 2026
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Ivanti Decides Security Is Purely Optional While Prague Bureaucrats Wait For A Signed Permission Slip Two fresh zero-day vulnerabilities, CVE-2025-0282 and CVE-2025-0283, allow for unauthenticated remote code execution and full system compromise across Ivanti's entire
@Aftershockindex
1 Mar 2026
128 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨🧩 cisa warns resurged malware may persist on ivanti devices CISA details RESURGE implant activity tied to Ivanti zero-day exploitation (CVE-2025-0282). learn more https://t.co/6yl4eGcsa2 #cisa #ivanti #zeroday #threatintel https://t.co/X6825z2Vmj
@Strivehawk
28 Feb 2026
177 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
dormant RESURGE malware on @GoIvanti devices. you're breached, you just don't know it yet. CVE-2025-0282
@BlackBoxBrief
28 Feb 2026
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA details RESURGE malware exploiting CVE-2025-0282 zero-day on Ivanti Connect Secure devices. Implant stays dormant until triggered by a forged Ivanti cert and specific TLS connection. #RESURGE #IvantiSecurity #USA https://t.co/usLlqK04IR
@TweetThreatNews
28 Feb 2026
189 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 CISA warns that RESURGE malware can be dormant on Ivanti devices The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282... #Cybersecurity #InfoSec
@TSM338678716525
28 Feb 2026
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA: RESURGE Malware Can Lurk Undetected on Ivanti Connect Secure Devices CISA warns the RESURGE implant (tied to exploitation of Ivanti Connect Secure flaw CVE-2025-0282) can remain latent and evade detection until an attacker re-contacts the device, enabling persistent
@ThreatSynop
27 Feb 2026
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA: RESURGE Implant May Stay Dormant on Compromised Ivanti Connect Secure Devices CISA warned that the RESURGE malware implant used in attacks exploiting Ivanti Connect Secure (notably CVE-2025-0282) can remain dormant to evade detection and persist across reboots,
@ThreatSynop
27 Feb 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#cyberNEWS The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices. https://t.co/UFgvEg6qw3
@CyberSysblue
27 Feb 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA updates RESURGE malware report, warning the implant exploits CVE-2025-0282 on Ivanti Connect Secure and can stay dormant while using covert network evasion. #Malware https://t.co/LKg3wjrdUt
@threatcluster
27 Feb 2026
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices. #cybersecurity https://t.co/Ef1rqFNdIB
@cybertzar
27 Feb 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA warns RESURGE malware can lie dormant on Ivanti devices, exposing zero-day risk via CVE-2025-0282. New details outline how this implant breaches Ivanti Connect Secure. Learn more about the threat and remediation steps in our latest post: https://t.co/Wa0EzHnuZa
@trubetech
27 Feb 2026
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA flags RESURGE malware, a dormant threat exploiting Ivanti zero-days (CVE-2025-0282). Stay vigilant! 🚨 🔗 https://t.co/oabZaRllpA #Cybersecurity #Ivanti #Malware #RESURGE #CISA
@0xT3chn0m4nc3r
27 Feb 2026
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
RESURGE — Analyse CTI complète disponible. La CISA a substantiellement mis à jour son analyse de l'implant RESURGE ciblant Ivanti Connect Secure (CVE-2025-0282, CVSS 9.0). Les révélations du 26 février 2026 changent l'évaluation de cette menace. Ce qu'il faut retenir : C
@marcfredericgo
27 Feb 2026
102 Impressions
0 Retweets
2 Likes
1 Bookmark
0 Replies
0 Quotes
RESURGE — Analyse CTI complète disponible. La CISA a substantiellement mis à jour son analyse de l'implant RESURGE ciblant Ivanti Connect Secure (CVE-2025-0282, CVSS 9.0). Les révélations du 26 février 2026 changent l'évaluation de cette menace. Ce qu'il faut retenir : C
@marcfredericgo
27 Feb 2026
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 [CRITICAL] Critical RCE Vulnerability in Ivanti Connect Secure (CVE-2025-0282) … 🔴 CVE: CVE-2025-0282, CVE-2025-0283 🕵️ APT: UNC5337 🏭 Sectors: government, finance #mysocAi #CyberSecurityusingAi #Vulnerability #Criticality #ThreatIntel #CyberSecurity #CVE20250
@MysocAi
23 Feb 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-0282 - critical 🚨 Ivanti Connect Secure - Stack-based Buffer Overflow > Ivanti Connect Secure < 22.7R2.5, Ivanti Policy Secure < 22.7R1.2, and Ivanti Neurons... 👾 https://t.co/wp0GSs5YV5 @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
6 Oct 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#threatreport #LowCompleteness Ivanti Connect Secure CVE-2025-0282 DslogdRAT Analysis | 28-04-2025 Source: https://t.co/XWfOxhlDft Key details below ↓ 💀Threats: Dslogdrat, Cobalt_strike_tool, Connectx, 🎯Victims: Ivanti connect secure gateways 🔓CVEs: CVE-2025-0282 ht
@rst_cloud
26 Sept 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
تحذير من @CISAgov برمجية خبيثة جديدة تعرف في Resurge تستغل ثغرة خطيرة في اجهزة Ivanti Connect Secure يلي بتستخدمها شركات ومؤسسات للدخول على شبكاتها عن بعد (VPN) المهاجم ممكن
@j6_mu
9 Sept 2025
201 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
Ivanti VPN hack (CVE-2025-0282) hit in Jan 2025, allowing remote code execution. $HOPR’s decentralized mixnet could prevent such attacks by avoiding single points of failure & central logs. Patch systems, use MFA! Details: https://t.co/dHZy4G5UMN. #HOPR #Web3 #privacymatter
@Sawaya2000
31 Aug 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-0282
@transilienceai
7 Aug 2025
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Hackers! 🧨🔥 [CVE-2025-0282] Python Exploit from Scratch Real RCE with Stealth Shell + Forensic Cleanup 🧠 Post-exploitation included: web shell deployment, log deletion, and stealth hiding Here's the link to the YouTube video Like and subscribe https://t.co/OfkVMFWYIz Hac
@Z3R0NYX
5 Aug 2025
33 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
Hackers! 🧨🔥 [CVE-2025-0282] Python Exploit from Scratch Real RCE with Stealth Shell + Forensic Cleanup 🧠 Post-exploitation included: web shell deployment, log deletion, and stealth hiding Here's the link to the YouTube video Like and subscribe https://t.co/OfkVMFWYIz Hac
@Z3R0NYX
5 Aug 2025
42 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
محققان امنیت سایبری جزئیات بدافزار جدیدی به نام MDifyLoader را فاش کردهاند که در حملات سایبری علیه دستگاههای Ivanti Connect Secure (ICS) مشاهده شده است. بر اساس گزارش JPC
@Teeegra
21 Jul 2025
444 Impressions
0 Retweets
10 Likes
0 Bookmarks
0 Replies
0 Quotes
Cyber attackers exploit CVE-2025-0282 and CVE-2025-22457 to deploy MDifyLoader on Ivanti Connect Secure appliances, enabling in-memory Cobalt Strike payloads via DLL side-loading and open-source tools, leading to stealthy breaches. #EternalBlue #UK https://t.co/QNsllF95ky
@TweetThreatNews
18 Jul 2025
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Malware loaders like MDifyLoader exploit Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457, using DLL side-loading and RC4 decryption to run Cobalt Strike Beacons, enabling lateral movement and persistence. #CVE20250282 #Indonesia https://t.co/7wP76r68Cj
@TweetThreatNews
18 Jul 2025
102 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Despite patches being available for months, Japanese authorities report ongoing exploitation of Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457. Attackers deploy malware like DslogdRAT and SPAWNCHIMERA using advanced tactics. #Japa… https://t.co/q0kXMe6gX
@TweetThreatNews
18 Jul 2025
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
JPCERT/CC's 増渕 維摩 (Yuma Masubuchi) looks into malware identified in attacks exploiting Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457 from December 2024 to the present. https://t.co/0gL5VBHyzk https://t.co/iWWlVR9X2j
@virusbtn
18 Jul 2025
1703 Impressions
12 Retweets
37 Likes
10 Bookmarks
0 Replies
1 Quote
ブログ JPCERT/CC Eyes「Ivanti Connect Secureの脆弱性を起点とした侵害で確認されたマルウェア」を公開。2024年12月から2025年7月現在まで、CVE-2025-0282やCVE-2025-22457を悪用する攻撃者が使用したマルウェア、ツール、攻
@jpcert
18 Jul 2025
7323 Impressions
26 Retweets
61 Likes
16 Bookmarks
1 Reply
1 Quote
Actively exploited CVE : CVE-2025-0282
@transilienceai
6 Jul 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-0282
@transilienceai
2 Jul 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 Urgent alert for Ivanti Connect Secure users! CVE-2025-0282 allows unauthenticated remote code execution, risking full control of your VPN. Patch to version 22.7R2.5 immediately and audit your systems. Stay safe! #Cybersecurity #RCE #Ivanti @Sharon https://t.co/fw37MHrQ2n
@prod42net
25 Jun 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2025-0282: Stack-based BoF in Ivanti Connect Secure - https://t.co/gg5z4ap4Go 2. CVE-2025-4123: Grafana Path Traversal - https://t.co/0QxWl8iNVO 3. CVE-2025-4275: SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O - https://t.co/l6ppF6bgYS
@ksg93rd
11 Jun 2025
276 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-0282
@transilienceai
18 May 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Stealthy as a cat, deadly as a viper—CVE-2025-0282 is on the prowl. Got your Ivanti patched yet, or leaving the door wide open? What’s your stance? #CyberSecurity #IvantiPatch #HurryUpOrCry #InfoSec https://t.co/TUo0RsN7U3
@LimitedViewX
17 May 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【注意⚠️】 Ivanti Connect Secureの未修正ゼロデイ(CVE-2025-0282)を狙ったDslogdRATマルウェア攻撃が国内組織で確認。 「パッチ適用して安心」はもう古い?攻撃側の手法を知り、防御を強化する視点が必要🔧 実
@cyber_risk_d
7 May 2025
155 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 🚩 https://t.co/DbCfZRA4DQ A new malware strain, DslogdRAT, has been deployed through the exploitation of a now-patched zero-day vulnerability (#CVE-2025-0282) in Ivanti Connect Secure (ICS) VPN appliances. T
@Huntio
2 May 2025
562 Impressions
4 Retweets
15 Likes
1 Bookmark
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-0282
@transilienceai
29 Apr 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day(CVE-2025-0282) in Japan Attacks https://t.co/bj5Hws5mkl https://t.co/2POtc1ZesO
@freedomhack101
29 Apr 2025
141 Impressions
0 Retweets
3 Likes
2 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
"matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "67D43D1D-564D-4ACD-B0FF-3828B95E9864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "BC8480E0-17C0-4590-950F-D3954E735365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3FAF4FB0-A88C-4A87-B6CB-32EF7B415885",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]