{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 9, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*"], "vendor": "ivanti", "product": "connect_secure", "versions": [{"status": "affected", "version": "22.7"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*"], "vendor": "ivanti", "product": "neurons_for_zero-trust_access", "versions": [{"status": "affected", "version": "22.7"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*"], "vendor": "ivanti", "product": "policy_secure", "versions": [{"status": "affected", "version": "22.7"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://github.com/sfewer-r7/CVE-2025-0282", "tags": ["exploit"]}, {"url": "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day", "tags": ["exploit", "technical-description"]}, {"url": "https://labs.watchtowr.com/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/", "tags": ["exploit", "third-party-advisory"]}, {"url": "https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282", "tags": ["third-party-advisory", "x_us-government-resource"]}, {"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283", "tags": ["vendor-advisory"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-0282", "tags": ["x_us-government-resource"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-0282", "tags": ["x_us-government-resource"]}], "descriptions": [{"lang": "en", "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution."}, {"lang": "es", "value": "Un desbordamiento de búfer basado en pila en Ivanti Connect Secure anterior a la versión 22.7R2.5, Ivanti Policy Secure anterior a la versión 22.7R1.2 e Ivanti Neurons para puertas de enlace ZTA anteriores a la versión 22.7R2.3 permite que un atacante remoto no autenticado logre la ejecución remota de código."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-121", "description": "CWE-121"}, {"lang": "en", "cweId": "CWE-787", "description": "CWE-787"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-01-08T23:15:09Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-0282", "state": "PUBLISHED", "dateUpdated": "2025-10-24T13:54:58Z", "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "datePublished": "2025-01-08T23:15:09Z", "assignerShortName": "ivanti"}, "dataVersion": "5.0"}