Vulnerabilities > CVE-2021-22893 - Use After Free vulnerability in Ivanti Connect Secure 9.0/9.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 36 |
Common Weakness Enumeration (CWE)
Related news
- WARNING: Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations (source)
- Week in review: Pulse Secure zero-day actively exploited, how to select an IAM solution (source)
- Critical Patch Out for Month-Old Pulse Secure VPN 0-Day Under Attack (source)
- Critical Patch Out for Critical Pulse Secure VPN 0-Day Under Attack (source)
- Pulse Secure VPNs Get a Fix for Critical Zero-Day Bugs (source)
References
- https://blog.pulsesecure.net/pulse-connect-secure-security-update/
- https://blog.pulsesecure.net/pulse-connect-secure-security-update/
- https://kb.cert.org/vuls/id/213092
- https://kb.cert.org/vuls/id/213092
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/
- https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html
- https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html
- https://www.kb.cert.org/vuls/id/213092