TechCrunch News 01月09日
Hackers are exploiting a new Ivanti VPN security bug to hack into company networks
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

美国软件巨头Ivanti警告称,其广泛使用的企业VPN设备中存在零日漏洞,已被利用来入侵企业客户的网络。该漏洞CVE-2025-0282无需身份验证即可远程在Ivanti的Connect Secure、Policy Secure和ZTA Gateways产品上植入恶意代码。Ivanti的Connect Secure VPN解决方案被广泛采用。该公司在发现客户设备上存在恶意活动后才意识到该漏洞。目前已发布Connect Secure的补丁,Policy Secure和ZTA Gateways的补丁将于1月21日发布。此外,还发现了一个尚未被利用的漏洞CVE-2025-0283。Mandiant认为,该漏洞可能与一个中国相关的网络间谍组织有关。英国和美国网络安全机构正在调查此事。

🚨 Ivanti的Connect Secure、Policy Secure和ZTA Gateways产品存在一个被积极利用的零日漏洞CVE-2025-0282,无需身份验证即可远程植入恶意代码。

🛡️ Ivanti已发布Connect Secure的补丁,但Policy Secure和ZTA Gateways的补丁将于1月21日发布,同时还发现了一个尚未被利用的漏洞CVE-2025-0283。

🕵️ Mandiant怀疑一个与中国有关的网络间谍组织UNC5337和UNC5221利用此漏洞,该组织曾在2024年利用Ivanti产品的两个零日漏洞发起大规模攻击。

🌍 多个机构,包括英国国家网络安全中心和美国网络安全机构CISA,正在积极调查和应对此漏洞带来的影响。

U.S. software giant Ivanti has warned that a zero-day vulnerability in its widely-used enterprise VPN appliance has been exploited to compromise the networks of its corporate customers.

Ivanti said on Wednesday that the critical-rated vulnerability, tracked as  CVE-2025-0282, can be exploited without any authentication to remotely plant malicious code on Ivanti’s Connect Secure, Policy Secure, and ZTA Gateways products. Ivanti says its Connect Secure remote-access VPN solution is “the most widely adopted SSL VPN by organizations of every size, across every major industry.”

This is the latest exploited security vulnerability to target Ivanti’s products in recent years. Last year, the technology maker pledged to overhaul its security processes after hackers targeted vulnerabilities in several of its products to launch mass-hacks against its customers. 

The company said it became aware of the latest vulnerability after its Ivanti Integrity Checker Tool (ICT) flagged malicious activity on some customer appliances.

In an advisory post published on Wednesday, Ivanti confirmed threat actors were actively exploiting CVE-2025-0282 “as a zero-day,” which means the company had no time to fix the vulnerability before it was discovered and exploited, and that it was aware of a “limited number of customers,” whose Ivanti Connect Secure appliances were hacked.

Ivanti said a patch is currently available for Connect Secure, but that patches for Policy Secure and ZTA Gateways — neither of which have confirmed exploitability — won’t be released until January 21. 

The company said it also discovered a second vulnerability, tracked as CVE-2025-0283, which has not yet been exploited.

Ivanti has not said how many of its customers are affected by the hacks or who is behind the intrusions. Spokespeople for Ivanti did not respond to TechCrunch’s questions by press time.

Incident response firm Mandiant, which discovered the vulnerability along with researchers at Microsoft, said in a blog post published late Wednesday that its researchers had observed hackers exploiting the Connect Secure zero-day as early as mid-December 2024. 

In an email to TechCrunch, Mandiant said that while it can’t attribute the exploitation to a specific threat actor, it suspects a China-linked cyberespionage group — tracked by its designations UNC5337 and UNC5221. This is the same cluster of threat group activity that exploited two zero-day flaws in Connect Secure in 2024 to launch mass hacks against Ivanti customers, Mandiant said in its blog post on Wednesday. 

Ben Harris, CEO of security research firm watchTowr Labs, told TechCrunch in an email that the company has seen “widespread impact” as a result of this latest Ivanti VPN flaw and has “been working with clients all day to make sure they’re aware.” 

Harris added that this vulnerability is of significant concern as the attacks have “all the hallmarks of [an advanced persistent threat] usage of a zero-day against a mission-critical appliance,” and urged everyone to “please take this seriously,” he said.

The U.K.’s National Cyber Security Centre said in an advisory that it was “investigating cases of active exploitation affecting U.K. networks.” U.S. cybersecurity agency CISA also added the vulnerability to its catalog of known-exploited vulnerabilities.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Ivanti 零日漏洞 网络安全 VPN 网络攻击
相关文章