Orange Cyberdefense’s Post

🚨 New Ivanti 0-Day Vulnerabilities Disclosed – Act Now to Protect Your Systems 🚨 Ivanti has disclosed two critical vulnerabilities affecting Connect Secure, Policy Secure, and Neurons for ZTA products: 🔍 CVE-2025-0282 Critical Remote Code Execution (RCE) Exploited in the wild by Chinese state-sponsored group UNC5337. Targets Connect Secure versions 22.7R2 to 22.7R2.4. 🔍 CVE-2025-0283 Privilege Escalation Vulnerability There is no evidence of exploitation so far. 💡 What You Need to Know: CVE-2025-0282 has a CVSS score of 9/10 and has been actively used for cyber espionage. Attackers are leveraging advanced malware like PHASEJAM and SPAWNANT to achieve persistence. Patches are now available in version 22.7R2.5. Ivanti also recommends running its updated External ICT checking tool to identify potential compromises. 🛡 Our Recommendations: 1️⃣ Run the latest ICT checker to identify suspicious files. 2️⃣ Upgrade to the patched version after thorough investigations. 3️⃣ Use Indicators of Compromise (IoCs) from tools like our Datalake and engage in proactive threat hunting through Orange Cyberdefense Managed Detection services. 👉Check out our blog post for a detailed look at our initial findings🕵️: https://ow.ly/pQL250UCOCT 👨⚕️🩹For assistance or remediation expertise, contact Orange Cyberdefense CERT or your representative. Stay vigilant! #Cybersecurity #Ivanti #VulnerabilityManagement #OrangeCyberdefense #ThreatIntelligence #CTI

  • No alternative text description for this image

To view or add a comment, sign in

Explore content categories