Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Baker Creek Pavilion: A blend of nature and architecture in Knoxville

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Important Ivanti flaws have been actively exploited to deploy Trailblaze and Brushfire malware
Identity

Important Ivanti flaws have been actively exploited to deploy Trailblaze and Brushfire malware

userBy userApril 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 4, 2025Ravi LakshmananMalware/Vulnerabilities

Important Ivanti Defects

Ivanti has revealed details of a critical security vulnerability currently patched affecting Connect Secure under active exploitation in the wild.

The vulnerability tracked as CVE-2025-22457 (CVSS score: 9.0) concerns a case of stack-based buffer overflow that can be exploited to execute arbitrary code on an affected system.

“Ivanti’s stack-based buffer overflow can securely connect before version 22.7R2.6, securely secure Ivanti policies before version 22.7R1.4, and use Ivanti ZTA Gateways before version 22.8R2.2, allowing remote, disapproved attackers to achieve remote code execution,” Ivanti announced Thursday.

Defects affect the following products and versions –

Ivanti Connect Secure (version 22.7R2.5 and PRIOR) – Fixed in version 22.7R2.6 (patch released on February 11, 2025). 22.7R1.3 and PRIOR) – Version 22.7R1.4 (available on April 21) ZTA Gateway (version 22.8R2 and previous) – Fixed in version 22.8R2.2 (available on April 19)

Cybersecurity

The company said it recognizes a “limited number of customers” that Connect Secure and Support Pulse Connect secure appliances are being abused. There is no evidence that Policy Secure or ZTA Gateways are subject to wild abuse.

“Customers need to monitor external ICTs and look for web server crashes,” Ivanti said. “If the ICT results show signs of compromise, you must perform a factory reset on the appliance and use version 22.7R2.6 to return the appliance to production.”

Here, Connect Secure version 22.7R2.6 also addresses multiple critical vulnerabilities (CVE-2024-38657, CVE-2025-22467, and CVE-2024-10644) to allow remote certified attackers to create arbitrary files and execute arbitrary code.

Mandiant, owned by Google, observed evidence of CVE-2025-22457 exploitation in mid-March 2025, allowing threat actors to offer an in-memory dropper called Trailblaze, a passive backdoor codename, Brushfire, and Spawn Malware Suite.

Attack chains essentially use a multi-stage shell script dropper to perform precedent. This causes Brushfire to be injected directly into the memory of the running web process to avoid detection. Exploitation activities are designed to establish sustained backdoor access to compromised appliances, which could allow for credential theft, further network intrusion, and data removal.

The use of spawning is attributed to Chinese enemy enemies tracked as UNC5221, along with clusters such as UNC5266, UNC5291, UNC5325, UNC537, UNC5337, and UNC386, which have a history of exploiting zero-day defects in Ivanti Connect Secure (ICS) devices.

By US government, UNC5221 is evaluated to share overlap with threat groups such as APT27, Silk Typhoon, and UTA0178. However, the threat intelligence company told Hacker News there was no sufficient evidence to confirm the connection.

“Mandiant tracks UNC5221 as a cluster of activities that have repeatedly exploited edge devices with zero-day vulnerabilities,” said Dan Perez of China Mission Technical Lead, Google Threat Intelligence Group.

“The link between this cluster and the government-created APT27 is plausible, but there is no independent evidence to confirm. The Silk Typhoon is Microsoft’s name for this activity and we cannot talk about their belongings.”

Cybersecurity

It has also been observed that UNC5221 utilizes obfuscation networks of compromised cyberomic instruments, QNAP devices, and ASUS routers to mask the true source during the intrusion operation.

The company also theorized that it is likely that threat actors have analyzed the February patch released by Ivanti, and found ways to leverage previous versions to achieve remote code execution for systems that are less than 100%. The development is believed to be attributed to the exploitation of N-Day security flaws on IVANTI devices for the first time.

“This latest activity from UNC5221 highlights the ongoing targeting of global edge devices by China and Nexus spy groups,” said Charles Carmakal, CTO of Mandiant Consulting.

“These actors continue to study security vulnerabilities and develop custom malware for enterprise systems that do not support EDR solutions. China – The speed of cyber intrusion activities by news spyers continues to increase, and these actors are better than ever.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOPSEC failure publishes Coquette malware campaign on BulletProof hosting server
Next Article The US reveals key plans to expand AI infrastructure
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Baker Creek Pavilion: A blend of nature and architecture in Knoxville

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.