# N/A
## 概述
存在一个基于堆栈的缓冲区溢出漏洞,影响多个版本的Ivanti产品,允许远程未认证攻击者实现远程代码执行。
## 影响版本
- Ivanti Connect Secure before version 22.7R2.6
- Ivanti Policy Secure before version 22.7R1.4
- Ivanti ZTA Gateways before version 22.8R2.2
## 细节
该漏洞存在于堆栈上的缓冲区溢出,攻击者无需认证即可利用此漏洞执行远程代码。
## 影响
该漏洞可允许远程未认证攻击者执行任意代码,进而控制受影响的系统。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Prevent CVE-2025-22457 and other security problems with Juniper/Ivanti Secure Connect SSL VPN | https://github.com/Vinylrider/ivantiunlocker | POC详情 |
2 | CVE-2025-22457 Python and Metasploit PoC for Ivanti unauthenticated RCE | https://github.com/N4SL1/CVE-2025-22457-PoC | POC详情 |
3 | PoC for CVE-2025-22457 | https://github.com/sfewer-r7/CVE-2025-22457 | POC详情 |
4 | CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE | https://github.com/securekomodo/CVE-2025-22457 | POC详情 |
5 | None | https://github.com/llussiess/CVE-2025-22457 | POC详情 |
6 | PoC CVE-2025-22457 | https://github.com/TRone-ux/CVE-2025-22457 | POC详情 |
7 | CVE-2025-22457 | https://github.com/B1ack4sh/Blackash-CVE-2025-22457 | POC详情 |
标题: April Security Advisory Ivanti Connect Secure, Policy Secure & ZTA Gateways (CVE-2025-22457) -- 🔗来源链接
标签:
神龙速读暂无评论