Emergency fixes are available, and only one product is impacted.
Ivanti has confirmed that it “rapidly developed and released a patch within weeks for Ivanti Connect Secure” after CVE-2025-0282 was found to have been exploited.
According to SC US, emergency fixes for the stack-based buffer overflow vulnerability were provided by Ivanti
Ivanti said that upon identifying the vulnerabilities through its Integrity Checker Tool (ICT), the patch for Ivanti Connect Secure was released. “The only product where limited exploitation has been observed,” a spokesperson told SC UK.
Two vulnerabilities - CVE-2025-0282 and CVE-2025-0283 - were found to be vulnerable, with the first exploited in the wild since mid-December 2024, according to analysis by Google Mandiant.
This week, Nominet said it is investigating a cybersecurity incident linked to the vulnerability, after attackers accessed its systems via “third-party VPN software supplied by Ivanti.”
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.