Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1581 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges. |
Tue, 14 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ivanti
Ivanti connect Secure Ivanti neurons For Zero-trust Access Ivanti policy Secure |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:21.12:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:21.9:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.1:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.1:r6:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.7:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.8:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18.9:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:-:*:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r4:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r5:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r4:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r3:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.3:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.5:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.6:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.7:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.3:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.4:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.5:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.6:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:* cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Ivanti
Ivanti connect Secure Ivanti neurons For Zero-trust Access Ivanti policy Secure |
Thu, 09 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Jan 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ivanti
Published:
Updated: 2026-02-26T19:09:31.728Z
Reserved: 2025-01-06T16:53:11.756Z
Link: CVE-2025-0283
Updated: 2025-01-09T17:41:21.471Z
Status : Analyzed
Published: 2025-01-08T23:15:09.920
Modified: 2025-01-14T15:58:55.813
Link: CVE-2025-0283
No data.
OpenCVE Enrichment
No data.
EUVD