Thursday, June 12, 2025
HomeCVE/vulnerabilityOver 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Over 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Over 5,000 Ivanti Connect Secure devices remain vulnerable to a critical remote code execution (RCE) flaw, according to data from the Shadowserver Foundation.

The vulnerability, tracked as CVE-2025-22457, stems from a stack-based buffer overflow issue, enabling unauthenticated attackers to execute arbitrary code remotely.

The flaw has already been exploited in the wild, raising alarms across the global cybersecurity community.

- Advertisement - Google News

Exploitation in the Wild

The Shadowserver Foundation revealed in a report published on April 6, 2025, that their scans had detected precisely 5,113 vulnerable Ivanti Connect Secure devices that had not yet been patched.

The severity of this vulnerability has placed it on the CISA Known Exploited Vulnerabilities (KEV) catalog, underscoring the urgent need for organizations to act.

According to Shadowserver, this RCE flaw allows attackers to gain full control over affected devices without requiring authentication.

This makes the vulnerability particularly dangerous, as threat actors could leverage it for activities such as data exfiltration, launching ransomware campaigns, or creating backdoors for persistent access.

Global Distribution of Vulnerable Devices

The Shadowserver Foundation’s interactive map highlights the geographic distribution of vulnerable devices. The exposure is widespread, with affected systems detected in both IPv4 and IPv6 spaces.

High concentrations of unpatched devices were observed in regions of North America, Europe, and Asia.

Organizations relying on Ivanti Connect Secure devices to manage their secure access infrastructure are advised to investigate their networks immediately.

Ivanti first disclosed CVE-2025-22457 in early March 2025, alongside the release of security updates to address the issue.

However, the latest findings indicate that a significant portion of devices remains unpatched, leaving critical infrastructure at risk.

Security experts strongly advise system administrators to implement the patches provided by Ivanti as a top priority.

In addition to applying the fix, organizations are encouraged to conduct comprehensive reviews of their access logs to identify any signs of compromise.

The continued existence of unpatched Ivanti Connect Secure devices highlights the ongoing challenge of timely patching in enterprise environments.

The lack of updates not only endangers the organizations using these devices but also presents risks to the broader digital ecosystem as attackers increasingly weaponize known vulnerabilities.

Cybersecurity professionals emphasize that attackers are likely scanning for and exploiting this vulnerability in unpatched systems.

Organizations that fail to take immediate action may face severe consequences, including data breaches, service disruptions, and potential legal liabilities.

As the threat landscape continues to evolve, this incident serves as a stark reminder of the importance of prioritizing patch management and maintaining robust cybersecurity hygiene.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users

A new, highly sophisticated cyberattack campaign is targeting users seeking to download the popular...

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification

A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and...

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community...

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials

A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users

A new, highly sophisticated cyberattack campaign is targeting users seeking to download the popular...

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification

A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and...

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community...