Article Details
Scrape Timestamp (UTC): 2025-05-13 15:56:25.205
Original Article Text
Click to Toggle View
Ivanti warns of critical Neurons for ITSM auth bypass flaw. Ivanti has released security updates for its Neurons for ITSM IT service management solution that mitigate a critical authentication bypass vulnerability. Tracked as CVE-2025-22462, the security flaw can let unauthenticated attackers gain administrative access to unpatched systems in low-complexity attacks, depending on system configuration. As the company highlighted in a security advisory released today, organizations that followed its guidance are less exposed to attacks. "Customers who have followed Ivanti's guidance on securing the IIS website and restricted access to a limited number of IP addresses and domain names have a reduced risk to their environment," Ivanti said. "Customers who have users log into the solution from outside their company network also have a reduced risk to their environment if they ensure that the solution is configured with a DMZ." Ivanti added that CVE-2025-22462 only impacts on-premises instances running versions 2023.4, 2024.2, 2024.3, and earlier, and said that it found no evidence that the vulnerability is being exploited to target customers. The company also urged customers today to patch a default credentials security flaw (CVE-2025-22460) in its Cloud Services Appliance (CSA) that can let local authenticated attackers escalate privileges on vulnerable systems. While this vulnerability isn't exploited in the wild either, Ivanti warned that the patch won't be applied correctly after installing today's security updates and asked admins to reinstall from scratch or use these mitigation steps to ensure their network is protected from potential attacks. "It has been identified that if a Cloud Services Application installation is upgraded to version 5.0.5, this fix is not automatically applied as intended. This will be addressed in a future release," Ivanti said. Last month, the company also patched a critical Connect Secure zero-day exploited by the UNC5221 China-linked espionage group in remote code execution attacks to deploy malware since at least mid-March 2025. As CISA and the FBI warned in January, threat actors are still exploiting Ivanti Cloud Service Appliances (CSA) security vulnerabilities patched since September to breach vulnerable networks. Over the last year, multiple other Ivanti security flaws have been exploited in zero-day attacks targeting the company's VPN appliances and ICS, IPS, and ZTA gateways. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
Ivanti has released updates addressing a critical auth bypass vulnerability in its Neurons for ITSM product, tracked as CVE-2025-22462.
The vulnerability allows unauthenticated attackers administrative access and impacts on-premises systems running specified earlier versions.
A proper configuration such as securing the IIS website or implementing DMZs reduces the risk of exploitation.
Ivanti also warned of another vulnerability (CVE-2025-22460) in its Cloud Services Appliance that could allow local privilege escalation.
The company advised that the fix for the CSA flaw is not automatically applied during upgrades and requires specific reinstall or mitigation steps.
No active exploitation of these vulnerabilities has been discovered, though the company continues to monitor for any potential misuse.
Previous vulnerabilities in Ivanti products have been exploited by nation-state actors, highlighting the importance of timely patch management.
Ivanti's ongoing patches follow the exploitation of other security flaws in its products, emphasizing a pattern of targeted cyberattacks.