Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation

Posted on May 13, 2025May 14, 2025 By CWS

Ivanti has disclosed a high-severity safety vulnerability affecting its Cloud Companies Utility (CSA) that might permit attackers to escalate privileges on weak programs. The safety flaw, tracked as CVE-2025-22460, was introduced on Might 13, 2025, as a part of Ivanti’s ongoing safety replace program.

In keeping with the corporate’s safety advisory, the vulnerability is brought on by default credentials current in Ivanti Cloud Companies Utility variations 5.0.4 and earlier.

Profitable exploitation may allow a neighborhood authenticated attacker to realize elevated privileges on affected programs, doubtlessly main to finish system compromise.

The vulnerability has been assigned a CVSS rating of seven.8 (Excessive) with a vector of CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating vital impression on confidentiality, integrity, and availability if exploited.

Cloud Companies Utility Vulnerability

“This vulnerability represents a critical danger for organizations using Ivanti CSA of their environments,” stated Mark Thompson, cybersecurity analyst at Digital Fortress. “Privilege escalation flaws usually function essential stepping stones in broader assault chains.”

Ivanti has launched model 5.0.5 to deal with the vulnerability, obtainable by the corporate’s obtain portal. Nonetheless, the corporate issued an essential caveat relating to the patch implementation.

“It has been recognized that if a Cloud Companies Utility set up is upgraded to model 5.0.5, this repair shouldn’t be routinely utilized as meant,” the advisory states.

This implementation subject means clients should carry out a contemporary set up or comply with particular mitigation steps supplied by Ivanti to correctly safe their programs.

The corporate famous that it’s not conscious of any lively exploitation of this vulnerability within the wild earlier than disclosure. Fraser Hess of Pinnacol Assurance reported the flaw by Ivanti’s accountable disclosure program.

This disclosure comes amid a sequence of safety challenges for Ivanti. Earlier this 12 months, the corporate patched a number of essential vulnerabilities in its Join Safe, Coverage Safe, and ZTA Gateway merchandise.

The CSA is an web equipment that gives safe communication and performance over the Web for Ivanti’s Endpoint Supervisor product line.

Safety consultants advocate that organizations utilizing affected variations prioritize this replace, notably given the implementation points with the patch.

Organizations must also evaluation their safety logs for any indicators of suspicious exercise that may point out earlier exploitation makes an attempt.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Application, Cloud, Escalation, Ivanti, Leads, Privilege, Services, Vulnerability

Post navigation

Previous Post: FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code
Next Post: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Days

Related Posts

28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News
Strengthening Security Measures In Digital Advertising Platforms Cyber Security News
Critical Apple 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Multiple Apache Tomcat Vulnerabilities Let Attackers Trigger DoS Attacks Cyber Security News
Authorities Busted Ransomware Gang – Nine Laptops and 15 Mobile Devices Were Seized Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News