![pulse secure vulnerability 2021 pulse secure vulnerability 2021](https://img2.helpnetsecurity.com/posts2021/Pulse_Connect_Secure_VPN-650.jpg)
- #Pulse secure vulnerability 2021 archive
- #Pulse secure vulnerability 2021 Patch
- #Pulse secure vulnerability 2021 code
Security teams need to understand what makes these vulnerabilities unique, how they are being attacked in the wild, and the key steps to mitigate their risk. Pulse Secure also highlights the critical role that firmware plays in today’s enterprise attack surface. Pulse Secure VPN devices have proven to be the most popular targets, and their ongoing exploitation highlights how devices that were intended to defend the network are increasingly being exploited to cause damage. Get a free 30-day trial of Tenable.io Vulnerability Management.Vulnerabilities in enterprise network and security devices are being aggressively targeted by APT and ransomware threat actors as initial access vectors into enterprises.
![pulse secure vulnerability 2021 pulse secure vulnerability 2021](https://www.tenable.com/sites/drupal.dmz.tenablesecurity.com/files/images/articles/TenableResearchCEAlertMedium_18.jpg)
Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface. Join Tenable's Security Response Team on the Tenable Community. Identifying affected systemsĪ list of Tenable plugins to identify this vulnerability will appear here as they’re released. If your organization deploys these devices, we recommend updating as soon as possible. VPNs in general and Pulse Secure specifically have been persistently targeted by attackers. Pulse Secure released PCS 9.1R12 to address this and several other vulnerabilities.
![pulse secure vulnerability 2021 pulse secure vulnerability 2021](https://media.threatpost.com/wp-content/uploads/sites/103/2021/04/21082808/PromoPic2-300x138.png)
While there is no direct PoC for CVE-2021-22937, Warren included a screenshot of the changes he made to his PoC for CVE-2020-8260 in his technical advisory for CVE-2021-22937, so we expect to see modified exploit scripts soon.
#Pulse secure vulnerability 2021 code
Given how simple it is to modify the exploit code for CVE-2020-8260, we expect to see attackers adopt CVE-2021-22937 quickly. Pulse Secure added validation to ensure archives only contain “expected files” to address CVE-2020-8260, but this validation does not apply to all archives, leaving an opening for attackers.Īn attacker needs access to an administrator account to exploit this vulnerability which may normally lower the severity of a vulnerability like this. Adjusting the available proof-of-concept (PoC) for CVE-2020-8260 to exploit CVE-2021-22937 is trivial, as Warren explains in his advisory. The vulnerability received a CVSSv3 score of 7.2 and has been actively targeted by attackers.
#Pulse secure vulnerability 2021 Patch
This vulnerability is a patch bypass for CVE-2020-8260 which Pulse Secure addressed in October 2020 with version 9.1R9.
Successful exploitation would give attackers root privileges on the targeted appliance.
#Pulse secure vulnerability 2021 archive
This unrestricted file upload vulnerability is due to a flaw in the way that archive files are extracted in the administrator web interface. AnalysisĬVE-2021-22937 is an uncontrolled archive extraction vulnerability in the Pulse Connect Secure appliance that allows an authenticated administrator to write arbitrary executable files to the "/home/runtime/tmp/tt/" directory. Richard Warren with NCC Group has published a technical advisory for this flaw, explaining it is a patch bypass for CVE-2020-8260 which he disclosed in October 2020. On August 2, Pulse Secure published an advisory and patches for several vulnerabilities, including CVE-2021-22937, a post-authentication remote code execution (RCE) vulnerability in Pulse Connect Secure virtual private network (VPN) appliances. Pulse Secure has patched CVE-2021-22937, a patch bypass for CVE-2020-8260, in its Connect Secure products.