Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Exploitation of Ivanti Connect Secure: A China-Linked Group's Zero-Day Attack


China-linked group UNC5221 has exploited a zero-day vulnerability in Ivanti Connect Secure since mid-March 2025, deploying malware families that were not previously observed in the wild. The incident highlights the ongoing threat posed by zero-day exploits and the importance of keeping software up-to-date.

  • Ivanti Connect Secure version 22.7R2.5 and earlier, as well as Pulse Connect Secure 9.x (end-of-support), are affected by a zero-day vulnerability (CVE-2025-22457).
  • The vulnerability allows for remote unauthenticated remote code execution via a stack-based buffer overflow.
  • A China-linked group known as UNC5221 exploited the vulnerability, deploying TRAILBLAZE and BRUSHFIRE malware.
  • Ivanti released Connect Secure 22.7R2.6 to address the vulnerability on February 11, 2025.
  • Uncertainty exists over when a limited number of customers with affected appliances were exploited at the time of disclosure.


  • In a recent development that has sent shockwaves through the cybersecurity community, it has been reported that a China-linked group known as UNC5221 has exploited a zero-day vulnerability in Ivanti Connect Secure since mid-March 2025. The vulnerability, which has been tracked as CVE-2025-22457, is a stack-based buffer overflow that allows for remote unauthenticated remote code execution.



    The vulnerability affects Ivanti Connect Secure version 22.7R2.5 and earlier, as well as Pulse Connect Secure 9.x (end-of-support as of December 31, 2024), Ivanti Policy Secure, and ZTA gateways. It is worth noting that the vulnerability was not disclosed by Ivanti until the group's exploitation attempts were observed by cybersecurity experts at Mandiant and Google Threat Intelligence Group (GTIG).



    The experts attributed the exploration attempts to UNC5221, a suspected China-nexus espionage actor that has been linked to zero-day exploits of edge devices dating back to 2023. The group is believed to have exploited the vulnerability in order to deploy TRAILBLAZE and BRUSHFIRE malware, along with SPAWN malware.



    According to Google GTIG's report, the earliest evidence of observed CVE-2025-22457 exploitation occurred in mid-March 2025. Following successful exploitation, the group observed the deployment of two newly identified malware families: the TRAILBLAZE in-memory only dropper and the BRUSHFIRE passive backdoor.



    Ivanti addressed the vulnerability with the release of Connect Secure 22.7R2.6 (released February 11, 2025). The company stated that a limited number of customers whose Ivanti Connect Secure (22.7R2.5 and earlier) and End-of-Support Pulse Connect Secure 9.1x appliances have been exploited at the time of disclosure.



    Ivanti encouraged all customers to ensure they are running Connect Secure 22.7R2.6 as soon as possible, which remediates the vulnerability. The company also urged admins to monitor Integrity Checker Tool (ICT) for web server crashes and reset compromised devices before redeploying them with version 22.7R2.6.



    Google GTIG's report highlighted the sophistication of UNC5221's exploitation attempt, noting that the group was able to deploy malware families that were not previously observed in the wild. The group's tactics, techniques, and procedures (TTPs) are consistent with those of other China-linked espionage actors.



    The incident serves as a reminder of the ongoing threat posed by zero-day exploits and the importance of keeping software up-to-date. It also highlights the need for increased vigilance in monitoring network activity and responding quickly to potential security incidents.



    In conclusion, the exploitation of Ivanti Connect Secure by UNC5221 demonstrates the continued evolution of advanced persistent threats (APTs) and the importance of staying vigilant in the face of emerging cybersecurity threats.




    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Exploitation-of-Ivanti-Connect-Secure-A-China-Linked-Groups-Zero-Day-Attack-ehn.shtml

  • https://securityaffairs.com/176162/apt/china-linked-group-unc5221-exploited-ivanti-connect-secure-zero-day-since-mid-march.html

  • https://www.bleepingcomputer.com/news/security/ivanti-patches-connect-secure-zero-day-exploited-since-mid-march/

  • https://www.theregister.com/2025/04/03/suspected_chines_snoops_hijacked_buggy/

  • https://medium.com/@scottbolen/mitre-attunes-spotlight-on-unc5221-decoding-chinas-apt-with-recent-attack-findings-2c3e7781c73b

  • https://apt.etda.or.th/cgi-bin/showcard.cgi?g=UNC5221, UTA0178


  • Published: Thu Apr 3 15:50:59 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us