CVE-2025-22457

ENISA EUVD: EUVD-2025-9646 ↗
Exploited in the Wild ✓ Confirmed 0-Day
Triaged: March 5, 2026 5 articles Published: 2025-04-03

EPSS Score

Source: FIRST.org · 2026-05-23
58.94%
probability
This CVE has a 58.94% probability of being exploited in the next 30 days.
0% Top 98.2th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
9
CRITICAL
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

Affected Products

Ivanti
Connect Secure
22.7R2.6
Ivanti
Policy Secure
22.7R1.4
Ivanti
Neurons for ZTA gateways
22.8R2.2

Attack Intelligence

Exploits & PoC

sfewer-r7/CVE-2025-22457

PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Sec

73 2025-04-25
securekomodo/CVE-2025-22457

CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE

19 2025-04-17
Vinylrider/ivantiunlocker

Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN

2 2025-04-13
TRone-ux/CVE-2025-22457

PoC CVE-2025-22457

1 2025-05-25
4 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 58.94%
CVSS v3.1 9
Mentions 5
Last Seen Apr 03, 2025

CNA Information

CNA Assigner
ivanti

Analyst Note

CVE-2025-22457 is explicitly named as a zero-day in BleepingComputer reporting exploitation since mid-March 2025, with patching occurring in April 2025. Exploitation clearly preceded patch availability, meeting the critical zero-day criterion. CRITICAL CVSS score and recent publication timing support high confidence.

Threat Actors 32

MuddyWater
apt_group Information theft and espionage 🇮🇷 IR
APT 41
apt_group Information theft and espionage 🇨🇳 CN
Turla Group
apt_group Information theft and espionage Russian Federation
Void Arachne
apt_group Information theft and espionage 🇨🇳 CN
DarkHotel
apt_group Information theft and espionage 🇰🇷 KR
APT27
apt_group Information theft and espionage 🇨🇳 CN
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Kimsuky
apt_group Information theft and espionage 🇰🇷 KR
CHRYSENE
apt_group Information theft and espionage 🇮🇷 IR
Hacking Team
apt_group 🇮🇹 IT
MAGNALLIUM
apt_group Sabotage and destruction 🇮🇷 IR
Tick
apt_group Information theft and espionage 🇨🇳 CN
ELECTRUM
apt_group Information theft and espionage 🇷🇺 RU
Infy
apt_group Information theft and espionage 🇮🇷 IR
Group 27
apt_group Information theft and espionage 🇨🇳 CN
Fox Kitten
apt_group Information theft and espionage 🇮🇷 IR
UTA0178
apt_group Information theft and espionage 🇨🇳 CN
UNC3886
apt_group Information theft and espionage 🇨🇳 CN
GreenCharlie
apt_group Information theft and espionage 🇮🇷 IR
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Chimera
apt_group Information theft and espionage 🇨🇳 CN
UNC5291
apt_group Information theft and espionage 🇨🇳 CN
UNC5325
apt_group 🇨🇳 CN
MirrorFace
apt_group 🇨🇳 CN
Teleboyi
apt_group 🇨🇳 CN
TRACER KITTEN
apt_group Information theft and espionage 🇮🇷 IR
UNC5330
apt_group 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
UNC5266
apt_group 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Beijing Group
apt_group Information theft and espionage 🇨🇳 CN

Triage Info

Decided atMar 05, 2026
Published DateApr 03, 2025