Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2021-22894 CVE-2021-22899 CVE-2021-22900 |
CWE-ID | CWE-119 CWE-78 CWE-434 |
Exploitation vector | Network |
Public exploit |
Vulnerability #1 is being exploited in the wild. Vulnerability #2 is being exploited in the wild. Vulnerability #3 is being exploited in the wild. |
Vulnerable software Subscribe |
Pulse Connect Secure Server applications / Remote access servers, VPN |
Vendor | Pulse Secure |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU52874
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-22894
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Pulse Connect Secure Collaboration Suite. A remote user can trigger memory corruption and execute arbitrary code on the target system as the root user via a maliciously crafted meeting room.
Install updates from vendor's website.
Vulnerable software versionsPulse Connect Secure: 9.0R1 - 9.1R11.3
Fixed software versionsCPE2.3 External links
http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU52875
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-22899
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote user can send a specially crafted request and execute arbitrary OS commands on the target system via Windows File Resource Profiles.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPulse Connect Secure: 9.0R1 - 9.1R11.3
Fixed software versionsCPE2.3 External links
http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU52876
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-22900
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of archives within the file upload feature. A remote authenticated administrator can upload a malicious file and execute it on the server.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPulse Connect Secure: 9.0R1 - 9.1R11.3
Fixed software versionsCPE2.3 External links
http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/p?pubstatus=o
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?