Pulse Connect Secure Buffer Overflow Vulnerability

Image
Decorative image
Gepubliceerd : 26/05/2021

Reference:
Advisory #2021-010

Version:
1.0

Affected software:
Pulse Connect Secure 9.0Rx
Pulse Connect Secure 9.1Rx

Type:
Buffer Overflow

CVE/CVSS:
CVE-2021-22908 - CVSS:8.5

Sources

Pulse Security Advisory: SA44800 - 2021-05: Out-of-Cycle Advisory: Pulse Connect Secure Buffer Overflow Vulnerability (pulsesecure.net)

Risks

A remote authenticated attacker with privileges to browse SMB shares can use this vulnerability to execute arbitrary code with root user privileges.

Recommended Actions

CERT.be recommends all system administrators to upgrade their vulnerable Pulse Secure instances to version 9.1R11.5 minimum once available.

There is currently a workaround available, you can find the procedure on the vendor's website: Pulse Security Advisory: SA44800 - 2021-05: Out-of-Cycle Advisory: Pulse Connect Secure Buffer Overflow Vulnerability (pulsesecure.net)