Vulnerability identifier: #VU40258
Vulnerability risk: High
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Pulse Connect Secure
Server applications /
Remote access servers, VPN
Vendor: Pulse Secure
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The administrative user interface in Pulse Connect Secure (PCS) 8.2 before 8.2r1, 8.1 before 8.1r2, 8.0 before 8.0r9, and 7.4 before 7.4r13.4 allows remote administrators to enumerate files, read arbitrary files, and conduct server side request forgery (SSRF) attacks via unspecified vectors.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Pulse Connect Secure: 7.4 - 8.2
CPE
External links
http://www.securitytracker.com/id/1035932
http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40210
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?