Pulse.Secure.VPN.gzip.Authenticated.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt against a Remote Code Execution vulnerability in Pulse Connect Secure VPN.
The vulnerability is due to insufficient sanitizing of user supplied inputs when handling a crafted HTTP request. An authenticated attacker could exploit this to execute arbitrary code in the context of the vulnerable application.

affected-products-logoAffected Products

For CVE-2020-8260:
Pulse Connect Secure (PCS) 9.1Rx or prior
Pulse Policy Secure (PPS) 9.1Rx or piror
Pulse Secure Desktop Client (PDC) 9.1Rx or prior
For CVE-2021-22937:
Pulse Connect Secure (PCS) before version 9.1R12

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
For CVE-2020-8260: https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
For CVE-2021-22937: https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44858

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-11-16 18.197 Sig Added
2021-08-26 18.147 Sig Added
2021-05-10 18.075 Name:Pulse.
Secure.
VPN.
gzip.
AUTH.
Remote.
Code.
Exectuion:Pulse.
Secure.
VPN.
gzip.
Authenticated.
Remote.
Code.
Execution
2021-02-22 17.020 Default_action:pass:drop
2021-02-04 17.011