CVE-2021-22894
Vulnerability from cvelistv5
Published
2021-05-27 11:15
Modified
2024-08-03 18:58
Severity ?
Summary
A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.
Impacted products
Vendor Product Version
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog

Date added: 2021-11-03

Due date: 2021-04-23

Required action: Apply updates per vendor instructions.

Used in ransomware: Unknown

Notes: Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22894

Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:58:25.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Pulse Connect Secure",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Fixed version 9.1R11.4"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "Code Injection (CWE-94)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-27T11:15:11",
        "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
        "shortName": "hackerone"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "support@hackerone.com",
          "ID": "CVE-2021-22894",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Pulse Connect Secure",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Fixed version 9.1R11.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Code Injection (CWE-94)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY",
              "refsource": "MISC",
              "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
    "assignerShortName": "hackerone",
    "cveId": "CVE-2021-22894",
    "datePublished": "2021-05-27T11:15:11",
    "dateReserved": "2021-01-06T00:00:00",
    "dateUpdated": "2024-08-03T18:58:25.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2021-22894",
      "cwes": "[\"CWE-94\"]",
      "dateAdded": "2021-11-03",
      "dueDate": "2021-04-23",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "Reference CISA\u0027s ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22894",
      "product": "Pulse Connect Secure",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "Ivanti Pulse Connect Secure Collaboration Suite contains a buffer overflow vulnerabilities that allows a remote authenticated users to execute code as the root user via maliciously crafted meeting room.",
      "vendorProject": "Ivanti",
      "vulnerabilityName": "Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability"
    },
    "fkie_nvd": {
      "cisaActionDue": "2021-04-23",
      "cisaExploitAdd": "2021-11-03",
      "cisaRequiredAction": "Apply updates per vendor instructions.",
      "cisaVulnerabilityName": "Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability",
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"3818B543-3415-4E27-8DAD-6BA9D3D9A1A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D47D09A8-4AC4-4CD9-B648-5F26453E2E1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r1.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E65C588-32E5-42FB-B1C0-DE80C44A9E2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"59331DC5-FF5F-4BB3-905E-5A4A621F86ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r2.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87B761-02B2-4CF1-B7FE-21F92C772FF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A708C3F-9050-4475-95B3-4785D3E2CB69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"52851AAA-88FB-40BC-B41A-B821F6BA9F79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r3.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"105B8B46-A328-4163-82FF-F4236FCA9B2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F05DC11E-7C41-450B-A2BF-603E9252BB40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DA976D9-A330-475E-B8C0-09EF3E08F18D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r3.3:*:*:*:*:*:*\", \"matchCriteriaId\": \"59F4A6F7-A6D4-4517-A316-7C7C002A9ED3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r3.5:*:*:*:*:*:*\", \"matchCriteriaId\": \"702094B0-2E5C-4A16-A8B0-F0EAF78E4ECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A369AE09-17E4-4541-A8E1-A2F4A1398EE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r4.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"E49FF0C8-CF7B-43D2-A144-5ED73848D875\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r4.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"24EF2F1A-8140-4FDB-8AF4-309AFAF998E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r5.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"4755BC2C-A96E-47AF-9D7C-E8D44B31F10B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.0:r6.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF6E8A0C-192B-4F51-86AA-FC2B85657632\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F450898-0B06-4073-9B76-BF22F68BD14F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B21C181-DC49-4EBD-9932-DBB337151FF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AA4B39F-2FB9-4752-B1F1-18812B0990B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"232BAB6C-D318-4F80-8F49-4E700C21F535\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD840BF-944E-4F4C-96DC-0256286338F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1995F34-AE75-47C4-9A9D-DBB1D3E130E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*\", \"matchCriteriaId\": \"366EF5B8-0233-49B8-806A-E54F60410ADE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FEFC4B1-7350-46F9-80C1-42F5AE06142F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB7A6D62-6576-4713-9BF4-11068A72E8B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"843BC1B9-50CC-4F8F-A454-A0CEC6E92290\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5355372-03EA-46D7-9104-A2785C29B664\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DE32A0C-8944-4F51-A286-266055CA4B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0349A0CC-A372-4E51-899E-D7BA67876F4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"93D1A098-BD77-4A7B-9070-A764FB435981\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CCC2D7B-F835-45EC-A316-2F0C5F2CF565\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD812596-C77C-4129-982F-C22A25B52126\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FA0B20D-3FA1-42AE-BDC5-93D8A182927C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFFA0B02-7F6D-4434-B1E7-EB8520FD68A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFE8FA87-9622-4D5B-99C7-D8EE230C0AA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:*\", \"matchCriteriaId\": \"07AB853D-5A3F-4142-8417-1C9FB729A89E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*\", \"matchCriteriaId\": \"16DAA769-8F0D-4C54-A8D9-9902995605B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C10C89-1DBC-4E91-BD28-D5097B589CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r9.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F54753D0-6275-4F82-B874-55438D2983B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.1\", \"matchCriteriaId\": \"02C5A1FF-7572-4CB7-81DA-9AE3C867AE67\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de Desbordamiento del B\\u00fafer en Pulse Connect Secure versiones anteriores a 9.1R11.4, permite a un atacante autenticado remoto ejecutar c\\u00f3digo arbitrario como usuario root por medio de una sala de reuniones dise\\u00f1ada con fines maliciosos\"}]",
      "id": "CVE-2021-22894",
      "lastModified": "2024-11-21T05:50:51.567",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-05-27T12:15:07.923",
      "references": "[{\"url\": \"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY\", \"source\": \"support@hackerone.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "support@hackerone.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"support@hackerone.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-94\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-22894\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2021-05-27T12:15:07.923\",\"lastModified\":\"2024-11-21T05:50:51.567\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de Desbordamiento del B\u00fafer en Pulse Connect Secure versiones anteriores a 9.1R11.4, permite a un atacante autenticado remoto ejecutar c\u00f3digo arbitrario como usuario root por medio de una sala de reuniones dise\u00f1ada con fines maliciosos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-11-03\",\"cisaActionDue\":\"2021-04-23\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability\",\"weaknesses\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3818B543-3415-4E27-8DAD-6BA9D3D9A1A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D47D09A8-4AC4-4CD9-B648-5F26453E2E1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r1.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E65C588-32E5-42FB-B1C0-DE80C44A9E2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"59331DC5-FF5F-4BB3-905E-5A4A621F86ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r2.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87B761-02B2-4CF1-B7FE-21F92C772FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A708C3F-9050-4475-95B3-4785D3E2CB69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"52851AAA-88FB-40BC-B41A-B821F6BA9F79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r3.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"105B8B46-A328-4163-82FF-F4236FCA9B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05DC11E-7C41-450B-A2BF-603E9252BB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA976D9-A330-475E-B8C0-09EF3E08F18D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r3.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F4A6F7-A6D4-4517-A316-7C7C002A9ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r3.5:*:*:*:*:*:*\",\"matchCriteriaId\":\"702094B0-2E5C-4A16-A8B0-F0EAF78E4ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A369AE09-17E4-4541-A8E1-A2F4A1398EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r4.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"E49FF0C8-CF7B-43D2-A144-5ED73848D875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r4.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EF2F1A-8140-4FDB-8AF4-309AFAF998E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r5.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"4755BC2C-A96E-47AF-9D7C-E8D44B31F10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.0:r6.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF6E8A0C-192B-4F51-86AA-FC2B85657632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F450898-0B06-4073-9B76-BF22F68BD14F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B21C181-DC49-4EBD-9932-DBB337151FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA4B39F-2FB9-4752-B1F1-18812B0990B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"232BAB6C-D318-4F80-8F49-4E700C21F535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD840BF-944E-4F4C-96DC-0256286338F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1995F34-AE75-47C4-9A9D-DBB1D3E130E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"366EF5B8-0233-49B8-806A-E54F60410ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FEFC4B1-7350-46F9-80C1-42F5AE06142F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB7A6D62-6576-4713-9BF4-11068A72E8B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"843BC1B9-50CC-4F8F-A454-A0CEC6E92290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5355372-03EA-46D7-9104-A2785C29B664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE32A0C-8944-4F51-A286-266055CA4B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0349A0CC-A372-4E51-899E-D7BA67876F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D1A098-BD77-4A7B-9070-A764FB435981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCC2D7B-F835-45EC-A316-2F0C5F2CF565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD812596-C77C-4129-982F-C22A25B52126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA0B20D-3FA1-42AE-BDC5-93D8A182927C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFA0B02-7F6D-4434-B1E7-EB8520FD68A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE8FA87-9622-4D5B-99C7-D8EE230C0AA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AB853D-5A3F-4142-8417-1C9FB729A89E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*\",\"matchCriteriaId\":\"16DAA769-8F0D-4C54-A8D9-9902995605B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C10C89-1DBC-4E91-BD28-D5097B589CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r9.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F54753D0-6275-4F82-B874-55438D2983B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.1\",\"matchCriteriaId\":\"02C5A1FF-7572-4CB7-81DA-9AE3C867AE67\"}]}]}],\"references\":[{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY\",\"source\":\"support@hackerone.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.