Skip to content

Blog

Critical-Ivanti-Vulnerability-CVE-2025-22457

Critical Ivanti Vulnerability CVE-2025-22457: What You Need to Know

Critical Ivanti Vulnerability CVE-2025-22457: What You Need to Know

A critical remote code execution (RCE) vulnerability (CVE-2025-22457) was found in Ivanti’s Connect Secure (ICS), Policy Secure, Pulse Connect Secure (PCS), and ZTA Gateways in April 2025. This vulnerability enables unauthenticated attackers to run arbitrary code on affected devices by utilising a stack-based buffer overflow in the X-Forwarded-For http request header. According to threat intelligence reports – UNC5221, a China-affiliated APT group, is actively exploiting this vulnerability to target the telecom, government, and defense industries.

 

In this blog, we’ll break down:

  • What is CVE-2025-22457
  • How Attackers exploit CVE-2025-22457
  • Detection of Vulnerable Devices
  • Mitigation strategies
  • Conclusion

Read More »Critical Ivanti Vulnerability CVE-2025-22457: What You Need to Know

Critical Apache Tomcat Vulnerability: CVE-2025-24813 Enables RCE – Are You Vulnerable?

Critical Apache Tomcat Vulnerability: CVE-2025-24813 Enables RCE – Are You Vulnerable?

A Critical vulnerability, CVE-2025–24813, was discovered in Apache Tomcat, a widely used open-source Java servlet container. This vulnerability stems from improper handling of path normalization, allowing attackers to bypass security controls and achieve Remote Code Execution (RCE). With a high severity rating, this vulnerability poses a significant risk to organizations using affected versions of Apache… Read More »Critical Apache Tomcat Vulnerability: CVE-2025-24813 Enables RCE – Are You Vulnerable?

CVE-2025-0108: How Attackers Exploit Palo Alto PAN-OS: Are You Vulnerable?

In early 2025, a critical authentication bypass vulnerability, CVE-2025-0108, was discovered in Palo Alto Networks’ PAN-OS. This vulnerability allows attackers to bypass authentication and gain unauthorized access to the PAN-OS management interface by exploiting a path confusion issue between Nginx and Apache. With a high severity rating, this vulnerability poses a significant risk to organizations… Read More »CVE-2025-0108: How Attackers Exploit Palo Alto PAN-OS: Are You Vulnerable?

What’s New at FireCompass: CISO Dashboard, 799 New Vulnerabilities, 50+ Attack Trees

The cybersecurity landscape is evolving rapidly, and so is our FireCompass PTaaS platform. Our research team remains dedicated to empowering security teams with PTaaS, Continuous Automated Red Teaming( CART), Automated Pen Testing and advanced risk monitoring. Here’s a quick look at what’s new this month! CISO Dashboard: Compare Your Security Posture Our new CISO Dashboard provides customers… Read More »What’s New at FireCompass: CISO Dashboard, 799 New Vulnerabilities, 50+ Attack Trees

Time to Exploit Vulnerabilities Now Just 3 Days: A Call to Action for Enhanced Cybersecurity Measures

Time to Exploit Vulnerabilities Now Just 3 Days

In the ever-evolving cybersecurity landscape, a stark new reality has emerged: the window for exploiting vulnerabilities has drastically reduced to an average of just three days. This alarming trend, highlighted in recent analyses by Mandiant and other security experts, underscores an urgent need for organizations to revamp their vulnerability management strategies to combat increasingly sophisticated… Read More »Time to Exploit Vulnerabilities Now Just 3 Days