CVE-2021-22893
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 06, 2021
- Published Date
- April 23, 2021
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- Pulse Connect Secure
- Description
- Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
CVSS Scores
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/
https://blog.pulsesecure.net/pulse-connect-secure-security-update/
https://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html
https://kb.cert.org/vuls/id/213092
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
orangmuda/CVE-2021-22893
Type: github • Created: 2021-10-03 21:46:58 UTC • Stars: 7
Proof On Concept — Pulse Secure CVE-2021-22893
MRLEE123456/CVE-2021-22893
Type: github • Created: 2021-04-21 14:39:42 UTC • Stars: 0
Pulse Connect Secure RCE Vulnerability (CVE-2021-22893)
ZephrFish/CVE-2021-22893_HoneyPoC2
Type: github • Created: 2021-04-21 09:48:57 UTC • Stars: 47
DO NOT RUN THIS.