CVE Vulnerabilities

CVE-2025-5450

Client-Side Enforcement of Server-Side Security

Published: Jul 08, 2025 | Modified: Jul 15, 2025
CVSS 3.x
2.7
LOW
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Improper access control in the certificate management component of Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated admin with read-only rights to modify settings that should be restricted.

Weakness

The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.

Affected Software

Name Vendor Start Version End Version
Connect_secure Ivanti * 22.7 (excluding)
Connect_secure Ivanti 22.7 (including) 22.7 (including)
Connect_secure Ivanti 22.7-r1 (including) 22.7-r1 (including)
Connect_secure Ivanti 22.7-r1.1 (including) 22.7-r1.1 (including)
Connect_secure Ivanti 22.7-r1.2 (including) 22.7-r1.2 (including)
Connect_secure Ivanti 22.7-r1.3 (including) 22.7-r1.3 (including)
Connect_secure Ivanti 22.7-r1.4 (including) 22.7-r1.4 (including)
Connect_secure Ivanti 22.7-r1.5 (including) 22.7-r1.5 (including)
Connect_secure Ivanti 22.7-r2 (including) 22.7-r2 (including)
Connect_secure Ivanti 22.7-r2.1 (including) 22.7-r2.1 (including)
Connect_secure Ivanti 22.7-r2.2 (including) 22.7-r2.2 (including)
Connect_secure Ivanti 22.7-r2.3 (including) 22.7-r2.3 (including)
Connect_secure Ivanti 22.7-r2.4 (including) 22.7-r2.4 (including)
Connect_secure Ivanti 22.7-r2.5 (including) 22.7-r2.5 (including)
Connect_secure Ivanti 22.7-r2.6 (including) 22.7-r2.6 (including)
Connect_secure Ivanti 22.7-r2.7 (including) 22.7-r2.7 (including)
Policy_secure Ivanti * 22.7 (excluding)
Policy_secure Ivanti 22.7 (including) 22.7 (including)
Policy_secure Ivanti 22.7-r1 (including) 22.7-r1 (including)
Policy_secure Ivanti 22.7-r1.1 (including) 22.7-r1.1 (including)
Policy_secure Ivanti 22.7-r1.2 (including) 22.7-r1.2 (including)
Policy_secure Ivanti 22.7-r1.3 (including) 22.7-r1.3 (including)
Policy_secure Ivanti 22.7-r1.4 (including) 22.7-r1.4 (including)

Potential Mitigations

  • For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
  • Even though client-side checks provide minimal benefits with respect to server-side security, they are still useful. First, they can support intrusion detection. If the server receives input that should have been rejected by the client, then it may be an indication of an attack. Second, client-side error-checking can provide helpful feedback to the user about the expectations for valid input. Third, there may be a reduction in server-side processing time for accidental input errors, although this is typically a small savings.

References