By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Times CatalogTimes CatalogTimes Catalog
  • Home
  • Tech
    • Google
    • Microsoft
    • YouTube
    • Twitter
  • News
  • How To
  • Bookmarks
Search
Technology
  • Meta
Others
  • Apple
  • WhatsApp
  • Elon Musk
  • Threads
  • About
  • Contact
  • Privacy Policy and Disclaimer
© 2025 Times Catalog
Reading: Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
Share
Notification
Font ResizerAa
Font ResizerAa
Times CatalogTimes Catalog
Search
  • News
  • How To
  • Tech
    • AI
    • Apple
    • Microsoft
    • Google
    • ChatGPT
    • Gemini
    • YouTube
    • Twitter
  • Coming Soon
Follow US
  • About
  • Contact
  • Privacy Policy and Disclaimer
© 2025 Times Catalog
Times Catalog > Blog > Security > Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
Security

Hackers are exploiting a new Ivanti VPN security bug to hack into company networks

Debra Massey
Last updated: January 9, 2025 5:18 pm
Debra Massey
Share
6 Min Read
Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
SHARE

In a significant cybersecurity alert, U.S. software giant Ivanti has revealed that a critical zero-day vulnerability in its enterprise VPN appliance has been actively exploited to breach the networks of corporate customers. The vulnerability, tracked as CVE-2025-0282, poses a severe risk as it allows attackers to plant malicious code remotely without requiring authentication. Ivanti’s Connect Secure, Policy Secure, and ZTA Gateways products are affected, leaving businesses across industries vulnerable to cyberattacks.

Contents
What Makes CVE-2025-0282 So Dangerous?Ivanti’s Ongoing Security ChallengesLimited Impact But Significant RiskAnother Vulnerability EmergesWho Is Behind the Exploits?Global Response to the ThreatWhat Should Businesses Do?The Bigger Picture

What Makes CVE-2025-0282 So Dangerous?

Ivanti’s Connect Secure is widely regarded as the most adopted SSL VPN solution, serving organizations of all sizes and industries. This latest vulnerability is particularly alarming because it requires no prior authentication, making it an easy target for attackers to exploit. Once compromised, the attackers can gain unrestricted access to corporate networks, enabling data theft, espionage, and other malicious activities.

The critical-rated CVE-2025-0282 has already been exploited in live attacks. Ivanti became aware of the issue after its Ivanti Integrity Checker Tool (ICT) flagged suspicious activity on certain customer appliances. This discovery highlights the urgency for businesses to act swiftly to secure their networks.

Ivanti’s Ongoing Security Challenges

This isn’t the first time Ivanti’s products have been in the spotlight for security vulnerabilities. Last year, the company faced widespread criticism after multiple flaws in its products were exploited in mass hacking campaigns. In response, Ivanti pledged to enhance its security measures. However, the emergence of this new zero-day flaw underscores the persistent challenges in maintaining robust cybersecurity for widely-used enterprise tools.

Limited Impact But Significant Risk

In its advisory, Ivanti stated that it is aware of a “limited number of customers” whose Connect Secure appliances have been compromised. While the full scale of the attacks remains unclear, the risk posed by this vulnerability is immense. The company has released a patch for Connect Secure, urging customers to apply it immediately. However, patches for the other affected products, Policy Secure and ZTA Gateways, are not expected until January 21, leaving some systems exposed for weeks.

Another Vulnerability Emerges

Adding to the complexity, Ivanti also disclosed a second vulnerability, tracked as CVE-2025-0283. While this flaw has not yet been exploited, it serves as a stark reminder of the ongoing risks associated with enterprise software vulnerabilities. Ivanti’s advisory emphasizes the importance of staying vigilant and updating systems as patches become available.

Who Is Behind the Exploits?

The identity of the hackers remains uncertain. Incident response firm Mandiant, which discovered the vulnerability alongside Microsoft researchers, observed exploitation of the zero-day flaw as early as mid-December 2024. While Mandiant has not attributed the attacks to a specific threat actor, it suspects the involvement of China-linked cyberespionage groups UNC5337 and UNC5221. These groups were previously implicated in exploiting two zero-day flaws in Connect Secure in 2024, resulting in widespread hacks against Ivanti’s customers.

Ben Harris, CEO of security research firm watchTowr Labs, described the vulnerability as having all the hallmarks of an advanced persistent threat (APT). “We’ve seen widespread impact from this flaw,” Harris said. “Organizations need to take this threat seriously and act immediately to mitigate potential damage.”

Global Response to the Threat

Governments and cybersecurity agencies worldwide are taking note. The U.K.’s National Cyber Security Centre (NCSC) issued an advisory confirming active exploitation of the vulnerability on U.K. networks. In the United States, the Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-0282 to its catalog of known-exploited vulnerabilities, urging organizations to prioritize patching.

What Should Businesses Do?

Ivanti has urged all customers using its Connect Secure solution to apply the available patch immediately. For those using Policy Secure and ZTA Gateways, implementing additional security measures, such as restricting access and monitoring network traffic, is crucial until patches are released.

Harris and other experts recommend organizations conduct thorough vulnerability assessments and leverage intrusion detection tools to identify any signs of compromise. Regularly updating software and employing multi-layered security defenses can significantly reduce the risk of falling victim to such attacks.

The Bigger Picture

This latest incident highlights the escalating threat posed by zero-day vulnerabilities, especially in mission-critical appliances like VPN solutions. Attackers continue to evolve their tactics, leveraging sophisticated techniques to exploit weaknesses before they can be patched. As businesses become increasingly reliant on digital infrastructure, proactive cybersecurity measures are no longer optional — they’re essential.

Ivanti’s ongoing efforts to address these vulnerabilities will be critical in restoring customer confidence. For now, the company’s customers must remain vigilant, ensuring their systems are up-to-date and fortified against emerging threats. The race to patch and protect is on, and the stakes have never been higher.

You Might Also Like

Android phones will soon reboot if they’re locked for a few days

Governments identify dozens of Android apps bundled with spyware

23andMe faces an uncertain future — so does your genetic data 

Android’s Find My Device app can now show you where people are, too

Apple is challenging U.K.’s iCloud encryption backdoor order

Share This Article
Facebook Twitter Pinterest Whatsapp Whatsapp Copy Link
What do you think?
Love0
Happy0
Sad0
Sleepy0
Angry0
Previous Article Threads and Instagram will recommend political content after all Threads and Instagram will recommend political content after all
Next Article Video editing app Captions switches to a freemium model to boost growth Video editing app Captions switches to a freemium model to boost growth
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

144FollowersLike
23FollowersFollow
237FollowersPin
19FollowersFollow

Latest News

Logitech’s MX Creative Console now supports Figma and Adobe Lightroom
Logitech’s MX Creative Console now supports Figma and Adobe Lightroom
Apps News Tech April 23, 2025
Samsung resumes its troubled One UI 7 rollout
Samsung resumes its troubled One UI 7 rollout
Google News Samsung Tech April 23, 2025
Google Messages starts rolling out sensitive content warnings for nude images
Google Messages starts rolling out sensitive content warnings for nude images
Apps News Tech April 22, 2025
Vivo wants its new smartphone to replace your camera
Vivo wants its new smartphone to replace your camera
News Tech April 22, 2025
Times CatalogTimes Catalog
Follow US
© 2025 Times Catalog
  • About
  • Contact
  • Privacy Policy and Disclaimer
Welcome Back!

Sign in to your account

Lost your password?