CVE-2025-22454
Published: 11 March 2025
Summary
CVE-2025-22454 is a high-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Ivanti Secure Access Client. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 49.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation directly patches the insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4, preventing local privilege escalation exploitation.
Enforcing least privilege restricts local low-privilege users from escalating via the vulnerable permissions in the Ivanti Secure Access Client.
Access enforcement ensures approved authorizations are strictly applied, countering the insufficiently restrictive permissions that enable privilege escalation in the client software.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables local privilege escalation via exploitation of weak permissions (CWE-732), directly matching T1068.
NVD Description
Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.
Deeper analysisAI
CVE-2025-22454 involves insufficiently restrictive permissions in Ivanti Secure Access Client versions before 22.7R4. This vulnerability, mapped to CWE-732, enables local privilege escalation and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). It was published on 2025-03-11.
A local authenticated attacker with low privileges can exploit this issue with low complexity and no user interaction required. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, resulting in privilege escalation on the affected system.
Ivanti has issued a security advisory detailing the vulnerability, available at https://forums.ivanti.com/s/article/March-Security-Advisory-Ivanti-Secure-Access-Client-ISAC-CVE-2025-22454, which provides guidance on mitigation and patching.
Details
- CWE(s)