Ivanti’s Vulnerability Comedy: When Patches Don’t Patch in Japan!
Ivanti vulnerabilities have been the gift that keeps on giving for Chinese threat actors targeting Japanese organizations. Despite patches, many systems remain vulnerable due to outdated hardware. It’s like trying to run a marathon in flip-flops—good intentions, bad execution.

Hot Take:
Ah, Ivanti, the gift that keeps on giving… headaches! In a plot twist that no one saw coming, the company known for its vulnerability-riddled products is back in the spotlight, and not in a good way. It seems Ivanti’s legacy of security flaws has become a beloved pastime for Chinese threat actors targeting Japanese organizations. If there were a cybersecurity Hall of Shame, Ivanti would have its own wing!
Key Points:
- Ivanti’s past vulnerabilities continue to haunt Japanese organizations, with Chinese threat actors exploiting them.
- Two critical vulnerabilities, CVE-2025-0282 and CVE-2025-22457, are at the heart of the ongoing attacks.
- Despite patches, the vulnerabilities remain a gateway for cyber mischief, partly due to outdated and unsupported systems.
- UNC5221, a notorious threat actor, has spearheaded campaigns utilizing these vulnerabilities for initial access.
- Japan’s reliance on Ivanti technology, coupled with a challenging upgrade path, exacerbates the issue.
Already a member? Log in here