Ivanti VPN pre-auth RCE → domain compromise in 48h
What happens
Ivanti Connect Secure has a stack overflow exploitable without credentials (CVSS 9.0, CISA KEV, exploited by APT UNC5221 in January 2025). Attacker gets a shell in your DMZ, pivots to internal network, extracts AD credentials, deploys ransomware within 48 hours.
Why your scanner misses the chain
Your network scanner detects CVE-2025-0282 and files it as a ticket. Your AD assessment finds lateral movement paths separately. No tool connects: "this CVE + this AD path = ransomware in 2 days." You triage them independently, CVE gets scheduled for next patch cycle.
How Pentesterra catches it
Continuous scan flags CVE-2025-0282 within days of CISA KEV listing. Attack chain engine correlates it with the discovered AD path in the same scan window. First chain node is marked fix-priority - patch the VPN, the entire chain collapses before it's ever executed.
