Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 20 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ivanti
Ivanti connect Secure |
|
| CPEs | cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:* |
|
| Vendors & Products |
Ivanti
Ivanti connect Secure |
Tue, 11 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 11 Feb 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ivanti
Published:
Updated: 2026-02-26T19:09:18.525Z
Reserved: 2025-01-07T02:19:27.272Z
Link: CVE-2025-22467
Updated: 2025-02-11T15:33:10.357Z
Status : Analyzed
Published: 2025-02-11T16:15:50.840
Modified: 2025-02-20T15:53:06.133
Link: CVE-2025-22467
No data.
OpenCVE Enrichment
No data.