Skip to main content

Ivanti Releases February 2025 Security Updates

Three advisories cover vulnerabilities and weaknesses in Ivanti Cloud Services Application (CSA), Ivanti Neurons for MDM, Ivanti Connect Secure, Policy Secure, and Secure Access Client.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Three advisories cover vulnerabilities and weaknesses in Ivanti Cloud Services Application (CSA), Ivanti Neurons for MDM, Ivanti Connect Secure, Policy Secure, and Secure Access Client.


Threat details

Introduction

Ivanti has released three security advisories in the February Security Update, which addresses vulnerabilities in Ivanti products. 

In the first advisory, two vulnerabilities were identified in Ivanti Cloud Services Application (CSA). The Ivanti CSA is an Internet appliance that provides secure communication and functionality over the Internet. It falls under the primary product of Ivanti Endpoint Manager, but security fixes are maintained separately. CVE-2024-47908 is a critical OS command injection vulnerability with a CVSSv3 9.1. Successful exploitation of CVE-2024-47908 could allow a remote authenticated attacker to achieve remote code execution (RCE).

The second advisory addresses a weakness in Ivanti Neurons for MDM (N-MDM), which could allow an attacker to gain incorrect privilege assignment. Ivanti Neurons for MDM is a Unified Endpoint Management (UEM) enabling secure access to data and apps on any endpoint. The cloud service was automatically updated as of January 17, 2025, and there are no additional actions for customers to take.  

The last advisory addresses eight vulnerabilities, which affect Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC), which provide virtual private network (VPN), network access control, and security monitoring functionality. The three critical vulnerabilities are designated as CVE-2025-22467, CVE-2024-38657, and CVE-2024-10644. Exploitation of these vulnerabilities could lead to RCE or allow an attacker with admin privileges to write arbitrary files.


Remediation advice

Affected organisations are encouraged to review the Ivanti February Security Update and apply the relevant security updates as soon as practicable. The advisories described above are listed in the remediation steps below.


Remediation steps

Type Step
Patch

Security Advisory Ivanti Cloud Services Application (CSA) (CVE-2024-47908, CVE-2024-11771)


https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-47908-CVE-2024-11771?language=en_US
Guidance

N-MDM - Security Advisory Ivanti Neurons for MDM (N-MDM)


https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-MDM-N-MDM?language=en_US
Patch

February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)


https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US

Definitive source of threat updates


CVE Vulnerabilities

Last edited: 12 February 2025 4:42 pm