CVE-2021-22893

Published Apr 23, 2021

Last updated 9 months ago

Overview

Description
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
Source
support@hackerone.com
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Ivanti Pulse Connect Secure Use-After-Free Vulnerability
Exploit added on
Nov 3, 2021
Exploit action due
Apr 23, 2021
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-416
support@hackerone.com
CWE-287

Configurations