Ivanti September Security Updates Address Multiple Vulnerabilities in Popular Products

Ivanti released its security bulletin for September, addressing 13 vulnerabilities. The vulnerabilities impact Ivanti Endpoint Manager, Ivanti Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access.

As per the Ivanti advisory, no proof exists for any of the vulnerabilities being exploited in the wild.

CVE-2025-9712 & CVE-2025-9872

Both vulnerabilities have high severity ratings with a CVSS score of 8.8. An insufficient filename validation in Ivanti Endpoint Manager before 2024 SU3 SR1 and 2022 SU8 SR2 may allow a remote unauthenticated attacker to achieve remote code execution. User interaction is required for successful exploitation of the vulnerability.

CVE-2025-55145

The vulnerability has a high severity rating with a CVSS score of 8.9. Missing authorization flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Successful exploitation of the vulnerability may allow a remote authenticated attacker to hijack existing HTML5 connections.

CVE-2025-55147

The vulnerability has a high severity rating with a CVSS score of 8.8. A Cross-Site Request Forgery flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Upon successful exploitation, a remote unauthenticated attacker may execute sensitive actions on behalf of the victim user. User interaction is required for successful exploitation of the vulnerability.

CVE-2025-55141 & CVE-2025-55142

Both vulnerabilities have a high severity rating with a CVSS score of 8.8. A missing authorization flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Successful exploitation of the vulnerabilities allows a remote authenticated attacker with read-only admin privileges to configure authentication-related settings.

CVE-2025-55148

The vulnerability has a high severity rating with a CVSS score of 7.6. A missing authorization flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. A remote authenticated attacker with read-only admin privileges can configure restricted settings upon successful exploitation.

CVE-2025-55139

The vulnerability has a medium severity rating with a CVSS score of 6.8. A Server-Side Request Forgery impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. A remote authenticated attacker with admin privileges can enumerate internal services upon successful exploitation.

CVE-2025-55143

The vulnerability has a medium severity rating with a CVSS score of 6.1. A reflected text injection flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Upon successful exploitation, a remote unauthenticated attacker can inject arbitrary text into a crafted HTTP response. User interaction is required for successful exploitation of the vulnerability.

CVE-2025-8712

The vulnerability has a medium severity rating with a CVSS score of 5.4. Missing authorization impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Upon successful exploitation, a remote authenticated attacker with read-only admin privileges to configure restricted settings.

CVE-2025-8711

The vulnerability has a medium severity rating with a CVSS score of 5.4. A cross-site request forgery flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Successful exploitation of the vulnerability may allow a remote unauthenticated attacker to execute limited actions on behalf of the victim user. User interaction is required for successful exploitation of the vulnerability.

CVE-2025-55144

The vulnerability has a medium severity rating with a CVSS score of 5.4. A missing authorization flaw impacts Ivanti Connect Secure, Ivanti Policy Secure, Ivanti ZTA Gateway, and Ivanti Neurons for Secure Access. Successful exploitation of the vulnerability may allow a remote authenticated attacker with read-only admin privileges to configure restricted settings.

Affected and Patched Versions

Product Name  Affected Versions  Patched Versions 
Ivanti Endpoint Manager  2022 SU8 Security Update 1 and prior  2022 SU8 Security Release 2 
Ivanti Endpoint Manager  2024 SU3 and prior  2024 SU3 Security Release 1 
Ivanti Connect Secure  22.7R2.8 and prior  22.7R2.9 OR 22.8R2 
Ivanti Policy Secure  22.7R1.5 and prior  22.7R1.6 
ZTA Gateways  22.8R2.2  22.8R2.3-723 
Neurons for Secure Access  22.8R1.3 and prior  22.8R1.4 

For more information, please refer to the Ivanti Security Advisories.

Qualys Detection

Qualys customers can scan their devices with QIDs 733161 and 733163 to detect vulnerable assets.

Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.

References
https://forums.ivanti.com/s/article/Security-Advisory-September-2025-for-Ivanti-EPM-2024-SU3-and-EPM-2022-SU8?language=en_US
https://forums.ivanti.com/s/article/September-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-and-Neurons-for-Secure-Access-Multiple-CVEs?language=en_US&_gl=1*1qims4n*_gcl_au*MTI1ODIyMTgzOC4xNzU2ODA3OTMy

Leave a Reply

Your email address will not be published. Required fields are marked *