
Ivanti has disclosed a critical vulnerability in its Connect Secure VPN, identified as CVE-2025-0282, which is currently being exploited by hackers. The cybersecurity firm Mandiant has linked this exploit to a Chinese nation-state actor, UNC5337, indicating a targeted campaign against networks using Ivanti's software. Researchers from Mandiant reported that the flaw allows for remote takeover attacks, raising concerns about the security of affected systems. In response to the vulnerability, Ivanti has released security updates to mitigate the risks associated with CVE-2025-0282 and another vulnerability, CVE-2025-0283, affecting its Connect Secure, Policy Secure, and ZTA Gateways. The urgency of the situation is underscored by the active exploitation of these vulnerabilities by threat actors.
Threat Actors Exploit a Critical Ivanti RCE Bug, Again: https://t.co/UcmWRKX9Ch by darkreading #infosec #cybersecurity #technology #news
The @CISAgov added three bugs to its Known Exploited Vulnerabilities (KEV) catalog, two that affected the Mitel MiCollab communications and collaboration platform, and an Oracle WebLogic Server bug from 2020. #cybersecurity #infosec #ITsecurity https://t.co/lPhdE2ydm4
CISA has seen a surge in its Cyber Hygiene (CyHy) service enrollment from critical infrastructure organizations over a two-year period, with the communications sector representing the biggest jump. https://t.co/uCE3OnKC2E https://t.co/gZFi3qEtxv
