Hackers Exploiting Ivanti Connect Secure RCE Vulnerability to Install SPAWNCHIMERA Malware
A critical vulnerability in Ivanti Connect Secure (CVE-2025-0282) is being actively exploited by multiple threat actors to deploy an advanced malware variant known as SPAWNCHIMERA. This vulnerability, disclosed in January 2025, is a stack-based buffer overflow that allows remote unauthenticated attackers to execute arbitrary code on vulnerable devices. With a CVSS score of 9.0, it […] The post Hackers Exploiting Ivanti Connect Secure RCE Vulnerability to Install SPAWNCHIMERA Malware appeared first on Cyber Security News.

A critical vulnerability in Ivanti Connect Secure (CVE-2025-0282) is being actively exploited by multiple threat actors to deploy an advanced malware variant known as SPAWNCHIMERA.
This vulnerability, disclosed in January 2025, is a stack-based buffer overflow that allows remote unauthenticated attackers to execute arbitrary code on vulnerable devices.
With a CVSS score of 9.0, it poses a significant risk to organizations using Ivanti’s remote access solutions.
Exploitation of the Vulnerability
The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) reported that exploitation of CVE-2025-0282 began in late December 2024, even before the vulnerability was publicly disclosed.
Attackers leveraged this flaw to infiltrate networks and install SPAWNCHIMERA malware, an evolution of the SPAWN malware family previously identified by Google’s Mandiant team.
SPAWNCHIMERA integrates features from earlier malware variants—SPAWNANT, SPAWNMOLE, and SPAWNSNAIL—making it a more sophisticated and evasive threat.
Key Technical Enhancements of the Malware
Inter-process Communication Changes
Previous versions used TCP port 8300 on 127.0.0.1 for communication between injected processes. SPAWNCHIMERA replaces this with UNIX domain sockets located at /home/runtime/tmp/.logsrv.
This change reduces visibility in network monitoring tools like netstat, making detection more challenging.
Dynamic Vulnerability Fix
Uniquely, SPAWNCHIMERA includes a feature to patch the exploited CVE-2025-0282 vulnerability dynamically.
By hooking the strncpy function and limiting its copy size to 256 bytes, the malware prevents subsequent exploitation attempts by other attackers or proof-of-concept (PoC) scans.
Enhanced Decoding Mechanisms
The private SSH key used for the malware’s server functionality is now stored in an encoded format within the binary and decoded at runtime using an XOR-based function.
This eliminates file artifacts like /tmp/.dskey, reducing forensic evidence left behind.
Removal of Debug Messages
Debugging features have been stripped from both SPAWNCHIMERA and its associated payloads (e.g., SPAWNSLOTH), complicating reverse engineering and analysis efforts.
The addition of a self-patching mechanism is particularly alarming as it demonstrates how attackers are evolving their tactics to secure their foothold while denying access to competing threat actors or defenders attempting remediation.
Furthermore, the use of encoded keys and UNIX domain sockets highlights a shift toward stealthier post-exploitation techniques.
Mitigation Measures
Ivanti has released patches addressing CVE-2025-0282 and recommends immediate application to all affected appliances, including Ivanti Connect Secure versions prior to 22.7R2.5.
The emergence of SPAWNCHIMERA underscores the growing sophistication of malware targeting enterprise-grade VPN solutions.
Organizations must act swiftly to patch vulnerabilities and enhance monitoring capabilities to mitigate risks associated with this advanced threat.
IoCs
Malware hashes
SPAWNCHIMERA 94b1087af3120ae22cea734d9eea88ede4ad5abe4bdeab2cc890e893c09be955
SPAWNSLOTH 9bdf41a178e09f65bf1981c86324cd40cb27054bf34228efdcfee880f8014baf
Found Malware File Paths
SPAWNCHIMERA /lib/libdsupgrade.so
SPAWNSLOTH /tmp/.liblogblock.so
The post Hackers Exploiting Ivanti Connect Secure RCE Vulnerability to Install SPAWNCHIMERA Malware appeared first on Cyber Security News.