CVE-2025-22457
ENISA EUVD: EUVD-2025-9646 ↗
Exploited in the Wild
✓ Confirmed 0-Day
Triaged: March 5, 2026
5 articles
Published: 2025-04-03
EPSS Score
Source: FIRST.org · 2026-05-23
58.94%
probability
This CVE has a 58.94% probability
of being exploited in the next 30 days.
0%
Top 98.2th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)9
CRITICAL
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Affected Products
Ivanti
Connect Secure
22.7R2.6
Ivanti
Policy Secure
22.7R1.4
Ivanti
Neurons for ZTA gateways
22.8R2.2
Attack Intelligence
Exploits & PoC
sfewer-r7/CVE-2025-22457
PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Sec
73
2025-04-25
securekomodo/CVE-2025-22457
CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
19
2025-04-17
Vinylrider/ivantiunlocker
Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN
2
2025-04-13
TRone-ux/CVE-2025-22457
PoC CVE-2025-22457
1
2025-05-25
4 repos — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
92%
EPSS
58.94%
CVSS v3.1
9
Mentions
5
Last Seen
Apr 03, 2025
CNA Information
CNA Assigner
ivanti
Analyst Note
CVE-2025-22457 is explicitly named as a zero-day in BleepingComputer reporting exploitation since mid-March 2025, with patching occurring in April 2025. Exploitation clearly preceded patch availability, meeting the critical zero-day criterion. CRITICAL CVSS score and recent publication timing support high confidence.
Threat Actors 32
MuddyWater
apt_group
Information theft and espionage
🇮🇷 IR
APT 41
apt_group
Information theft and espionage
🇨🇳 CN
Turla Group
apt_group
Information theft and espionage
Russian Federation
Void Arachne
apt_group
Information theft and espionage
🇨🇳 CN
DarkHotel
apt_group
Information theft and espionage
🇰🇷 KR
APT27
apt_group
Information theft and espionage
🇨🇳 CN
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Kimsuky
apt_group
Information theft and espionage
🇰🇷 KR
CHRYSENE
apt_group
Information theft and espionage
🇮🇷 IR
Hacking Team
apt_group
🇮🇹 IT
MAGNALLIUM
apt_group
Sabotage and destruction
🇮🇷 IR
Tick
apt_group
Information theft and espionage
🇨🇳 CN
ELECTRUM
apt_group
Information theft and espionage
🇷🇺 RU
Infy
apt_group
Information theft and espionage
🇮🇷 IR
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
Fox Kitten
apt_group
Information theft and espionage
🇮🇷 IR
UTA0178
apt_group
Information theft and espionage
🇨🇳 CN
UNC3886
apt_group
Information theft and espionage
🇨🇳 CN
GreenCharlie
apt_group
Information theft and espionage
🇮🇷 IR
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Chimera
apt_group
Information theft and espionage
🇨🇳 CN
UNC5291
apt_group
Information theft and espionage
🇨🇳 CN
UNC5325
apt_group
🇨🇳 CN
MirrorFace
apt_group
🇨🇳 CN
Teleboyi
apt_group
🇨🇳 CN
TRACER KITTEN
apt_group
Information theft and espionage
🇮🇷 IR
UNC5330
apt_group
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
UNC5266
apt_group
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Beijing Group
apt_group
Information theft and espionage
🇨🇳 CN
Triage Info
Decided atMar 05, 2026
Published DateApr 03, 2025