Other

Ivanti Connect Secure zero-day exploitation CVE-2025-22457 (UNC5221 / China-nexus)

πŸ“… 2025-03-15 🏒 Ivanti Connect Secure VPN (versions 22.7R2.5 and earlier; ICS 9.x end-of-life) 🦠 TRAILBLAZE (in-memory dropper), BRUSHFIRE (passive backdoor), SPAWN ecosystem πŸ”Ž CVE-2025-22457
Primary Source β†—

Incident Details

CVE-2025-22457 is a stack-based buffer overflow in Ivanti Connect Secure. Ivanti initially classified it as a low-risk DoS-only vulnerability and patched it 11 February 2025 in version 22.7R2.6. Chinese APT group UNC5221 reverse-engineered the patch, determined RCE was achievable on 22.7R2.5 and earlier, and began active exploitation in mid-March 2025. Mandiant and Google GTIG confirmed exploitation and attributed to UNC5221 (suspected Chinese espionage). Malware deployed: TRAILBLAZE in-memory dropper, BRUSHFIRE passive backdoor, and the SPAWN ecosystem of implants. Shadowserver found 5,113 vulnerable instances on 6 April 2025. CISA added to KEV catalog. Mandiant also identified zero-day exploitation of CVE-2025-0282 beginning mid-December 2024 (separate earlier campaign).

Technical Details

Initial Attack Vector
CWE-121: Stack-based Buffer Overflow (CVE-2025-22457 β€” stack buffer overflow in Ivanti Connect Secure enabling remote code execution)
Vendor / Product
Ivanti Connect Secure VPN (versions 22.7R2.5 and earlier; ICS 9.x end-of-life)
Malware Family
TRAILBLAZE (in-memory dropper), BRUSHFIRE (passive backdoor), SPAWN ecosystem
CVE / GHSA References
CVE-2025-22457

Timeline

  1. 2025-03-15 Breach occurred
  2. 2025-04-03 Publicly disclosed
  3. 2025-04-03 Customers notified