CVE-2021-22893
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 06, 2021
- Published Date
- April 23, 2021
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- Pulse Connect Secure
- Description
- Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS v2.0
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
orangmuda/CVE-2021-22893
Type: github • Created: 2021-10-03 21:46:58 UTC • Stars: 7
MRLEE123456/CVE-2021-22893
Type: github • Created: 2021-04-21 14:39:42 UTC • Stars: 0
ZephrFish/CVE-2021-22893_HoneyPoC2
Type: github • Created: 2021-04-21 09:48:57 UTC • Stars: 47
Timeline
-
CVE ID Reserved
-
Proof of Concept Exploit Available
-
CVE Published to Public
-
Exploit Used in Malware
-
Added to KEVIntel