CVE-2025-22457
03.04.2025, 16:15
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.Enginsight
Vendor | Product | Version |
---|---|---|
ivanti | connect_secure | 𝑥 < 22.7 |
ivanti | connect_secure | 22.7 |
ivanti | connect_secure | 22.7:r1 |
ivanti | connect_secure | 22.7:r1.1 |
ivanti | connect_secure | 22.7:r1.2 |
ivanti | connect_secure | 22.7:r1.3 |
ivanti | connect_secure | 22.7:r1.4 |
ivanti | connect_secure | 22.7:r1.5 |
ivanti | connect_secure | 22.7:r2 |
ivanti | connect_secure | 22.7:r2.1 |
ivanti | connect_secure | 22.7:r2.2 |
ivanti | connect_secure | 22.7:r2.3 |
ivanti | connect_secure | 22.7:r2.4 |
ivanti | connect_secure | 22.7:r2.5 |
ivanti | neurons_for_zero-trust_access | - |
ivanti | neurons_for_zero-trust_access | 22.2:r1 |
ivanti | neurons_for_zero-trust_access | 22.2:r4 |
ivanti | neurons_for_zero-trust_access | 22.2:r5 |
ivanti | neurons_for_zero-trust_access | 22.3:r1 |
ivanti | neurons_for_zero-trust_access | 22.3:r4 |
ivanti | neurons_for_zero-trust_access | 22.4:r1 |
ivanti | neurons_for_zero-trust_access | 22.4:r3 |
ivanti | neurons_for_zero-trust_access | 22.5:r1 |
ivanti | neurons_for_zero-trust_access | 22.5:r1.2 |
ivanti | neurons_for_zero-trust_access | 22.6:r1 |
ivanti | neurons_for_zero-trust_access | 22.6:r1.2 |
ivanti | neurons_for_zero-trust_access | 22.6:r1.3 |
ivanti | neurons_for_zero-trust_access | 22.6:r1.5 |
ivanti | neurons_for_zero-trust_access | 22.6:r1.6 |
ivanti | neurons_for_zero-trust_access | 22.6:r1.7 |
ivanti | neurons_for_zero-trust_access | 22.7:r1 |
ivanti | neurons_for_zero-trust_access | 22.7:r1.2 |
ivanti | neurons_for_zero-trust_access | 22.7:r1.3 |
ivanti | neurons_for_zero-trust_access | 22.7:r1.4 |
ivanti | neurons_for_zero-trust_access | 22.7:r1.5 |
ivanti | neurons_for_zero-trust_access | 22.7:r1.6 |
ivanti | neurons_for_zero-trust_access | 22.7:r2 |
ivanti | neurons_for_zero-trust_access | 22.7:r2.2 |
ivanti | neurons_for_zero-trust_access | 22.7:r2.3 |
ivanti | neurons_for_zero-trust_access | 22.8:r1 |
ivanti | neurons_for_zero-trust_access | 22.8:r1.1 |
ivanti | neurons_for_zero-trust_access | 22.8:r2 |
ivanti | policy_secure | 𝑥 < 22.7 |
ivanti | policy_secure | 22.7 |
ivanti | policy_secure | 22.7:r1 |
ivanti | policy_secure | 22.7:r1.1 |
ivanti | policy_secure | 22.7:r1.2 |
ivanti | policy_secure | 22.7:r1.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.