Ivanti’s Bug Bonanza: Another Year, Another Hack Attack Fiasco!

Chinese threat actor UNC5337 is exploiting Ivanti remote access devices again, proving that Ivanti vulnerabilities are like an unwanted sequel. Even with secure-by-design efforts, new bugs CVE-2025-0282 and CVE-2025-0283 have surfaced, causing headaches for IT teams everywhere. Who knew malware could be so persistent—and so creative with fake progress bars?

Pro Dashboard

Hot Take:

If Ivanti appliances were a TV series, they’d be “The Walking Dead” of cybersecurity. Just when you think they’re secure, another bug crawls out of the grave to haunt them! It’s like a never-ending game of Whack-a-Mole with cyber criminals, except this time, the mole knows Kung Fu and has a PhD in Rocket Science.

Key Points:

  • Ivanti is facing yet another round of exploitation by a Chinese threat actor, focusing on its remote access devices.
  • A new critical vulnerability in Ivanti’s Connect Secure (ICS) is under exploitation, along with a second, less severe bug.
  • Two new vulnerabilities, CVE-2025-0283 and CVE-2025-0282, were identified with varying degrees of severity.
  • Unique malware like SpawnAnt, SpawnMole, and others have been deployed to exploit these vulnerabilities.
  • Mitigation efforts are underway, with instructions and patches being provided by Ivanti and CISA.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?