{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:21.12:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:21.9:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.1:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.1:r6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18.7:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18.8:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18.9:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*"], "vendor": "ivanti", "product": "connect_secure", "versions": [{"status": "affected", "version": "22.2", "lessThan": "22.7", "versionType": "custom"}, {"status": "affected", "version": "0", "lessThan": "9.1", "versionType": "custom"}, {"status": "affected", "version": "21.12"}, {"status": "affected", "version": "21.9"}, {"status": "affected", "version": "22.1"}, {"status": "affected", "version": "22.7"}, {"status": "affected", "version": "9.1"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:ivanti:neurons_for_zero-trust_access:-:*:*:*:*:*:*:*"], "vendor": "ivanti", "product": "neurons_for_zero-trust_access", "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.7:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.4:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.5:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.6:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*", "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*"], "vendor": "ivanti", "product": "neurons_for_zero-trust_access", "versions": [{"status": "affected", "version": "22.2"}, {"status": "affected", "version": "22.3"}, {"status": "affected", "version": "22.4"}, {"status": "affected", "version": "22.5"}, {"status": "affected", "version": "22.6"}, {"status": "affected", "version": "22.7"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*", "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*"], "vendor": "ivanti", "product": "policy_secure", "versions": [{"status": "affected", "version": "0", "lessThan": "22.7", "versionType": "custom"}, {"status": "affected", "version": "22.7"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283", "tags": ["vendor-advisory"]}], "descriptions": [{"lang": "en", "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges."}, {"lang": "es", "value": "Un desbordamiento de búfer basado en pila en Ivanti Connect Secure anterior a la versión 22.7R2.5, Ivanti Policy Secure anterior a la versión 22.7R1.2 e Ivanti Neurons para puertas de enlace ZTA anteriores a la versión 22.7R2.3 permite que un atacante autenticado local escale sus privilegios."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-121", "description": "CWE-121"}, {"lang": "en", "cweId": "CWE-787", "description": "CWE-787"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-01-08T23:15:09Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-0283", "state": "PUBLISHED", "dateUpdated": "2025-01-14T15:58:55Z", "assignerOrgId": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "datePublished": "2025-01-08T23:15:09Z", "assignerShortName": "ivanti"}, "dataVersion": "5.0"}