CISA KEV 정보
| 취약점명 | Ivanti Pulse Connect Secure Use-After-Free Vulnerability |
|---|---|
| 설명 | Ivanti Pulse Connect Secure contains a use-after-free vulnerability that allow a remote, unauthenticated attacker to execute code via license services. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-287 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22893 |
NVD 상세 정보
CVSS v3.1: 10.0 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HCVSS v2.0: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P설명: Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
CWE: CWE-287 | CWE-416
참조
- https://blog.pulsesecure.net/pulse-connect-secure-security-update/ [Vendor Advisory]
- https://kb.cert.org/vuls/id/213092 [Third Party Advisory, US Government Resource]
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/ [Broken Link, Vendor Advisory]
- https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html [Third Party Advisory]
- https://blog.pulsesecure.net/pulse-connect-secure-security-update/ [Vendor Advisory]
- https://kb.cert.org/vuls/id/213092 [Third Party Advisory, US Government Resource]
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/ [Broken Link, Vendor Advisory]
- https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html [Third Party Advisory]
- https://www.kb.cert.org/vuls/id/213092 [US Government Resource]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22893 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.