CISA KEV 정보
| 취약점명 | Ivanti Pulse Connect Secure Code Execution Vulnerability |
|---|---|
| 설명 | Pulse Connect Secure contains an unspecified vulnerability that allows an authenticated attacker to perform code execution using uncontrolled gzip extraction. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-434 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8260 |
NVD 상세 정보
CVSS v3.1: 7.2 HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 6.5
AV:N/AC:L/Au:S/C:P/I:P/A:P설명: A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
CWE: CWE-434 | CWE-434
참조
- http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 [Broken Link, Vendor Advisory]
- http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 [Broken Link, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-8260 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.