Illustration: Supimol Kumying | Shutterstock
Software biz Ivanti has patched an actively exploited vulnerability affecting its Connect Secure software suite. The vulnerability, tracked as CVE-2025-22457 with a CVSS score of 9.0, has already been exploited in the wild to deploy Trailblaze and Bushfire malware.
The bug affects the following Ivanti products:
- Ivanti Connect Secure: Versions 22.7R2.5 and earlier were affected. The vulnerability has been patched in Version 22.7R2.6, released on February 11, 2025.
- Ivanti Policy Secure: Versions 22.7R1.3 and prior were affected. The issue has been fixed in version 22.7R1.4, but the patch will be available starting April 21.
- Pulse Connect Secure: Versions 9.1R18.9 and prior were affected. The issue has been fixed in version 22.7R2.6, but users need to contact Ivanti for a version migration as the device has reached end-of-life as of December 31, 2024.
- ZTA Gateways: Versions 22.8R2 and prior were affected. The issue has been fixed in version 22.8R2.2, but it will be available starting April 19.

The company has confirmed that it knows a “limited number of customers” targeted on their Connect Secure and Pulse Connect Secure endpoints. However, there’s no evidence to suggest that Policy Secure or ZTA Gateways have been exploited in the wild.
Cybersecurity firm Mandiant published a report claiming it had found evidence of the bug being exploited in the wild in mid-March 2025. The attackers exploited the issue to drop an in-memory dropper called Trailblaze, a passive backdoor dubbed Brushfire, and the Spawn malware suite. The latter consists of a log tampering utility, an uncompressed Linux kernel image extracted, and an improved version of the Spawnant malware called Spawnwave.
These attacks could establish persistent backdoors on compromised devices, enabling credential theft, data extraction, and even lateral network movement if successful. The Spawn malware suite was previously associated with a Chinese state-sponsored threat actor dubbed UNC5221, which has a history of exploiting zero-day vulnerabilities in Ivanti Connect Secure devices.
In the News: Oracle quietly confirms cloud data breach to select customers
