CISA KEV 정보
| 취약점명 | Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability |
|---|---|
| 설명 | Ivanti Pulse Connect Secure contains an arbitrary file read vulnerability that allows an unauthenticated remote attacker with network access via HTTPS to send a specially crafted URI. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-22 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2019-11510 |
NVD 상세 정보
CVSS v3.1: 10.0 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HCVSS v3.0: 9.9 CRITICAL
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HCVSS v2.0: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P설명: In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
CWE: CWE-22 | CWE-22
참조
- http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html [Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/108073 [Broken Link, Third Party Advisory, VDB Entry]
- https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/ [Broken Link, Third Party Advisory]
- https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ [Exploit, Third Party Advisory]
- https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf [Third Party Advisory]
- https://kb.pulsesecure.net/?atype=sa [Not Applicable, Vendor Advisory]
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/ [Broken Link, Patch, Vendor Advisory]
- https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E [Mailing List]
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010 [Third Party Advisory]
- https://www.kb.cert.org/vuls/id/927237 [Third Party Advisory, US Government Resource]
- http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html [Third Party Advisory, VDB Entry]
- http://www.securityfocus.com/bid/108073 [Broken Link, Third Party Advisory, VDB Entry]
- https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/ [Broken Link, Third Party Advisory]
- ... 외 8건
This product uses the NVD API but is not endorsed or certified by the NVD.