First published: Tue Aug 02 2016(Updated: )
Pulse Secure Desktop before 5.2R2 and Pulse Secure Installer Service before 8.2R2 and below for Windows allow restricted users to gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Odyssey Access Client | <=5.6r16.0 | |
Pulse Secure Desktop | =5.0r1.0 | |
Pulse Secure Desktop | =5.0r2.0 | |
Pulse Secure Desktop | =5.0r3.0 | |
Pulse Secure Desktop | =5.0r3.1 | |
Pulse Secure Desktop | =5.0r4.0 | |
Pulse Secure Desktop | =5.0r4.1 | |
Pulse Secure Desktop | =5.0r5.0 | |
Pulse Secure Desktop | =5.0r6.0 | |
Pulse Secure Desktop | =5.0r7.0 | |
Pulse Secure Desktop | =5.0r8.0 | |
Pulse Secure Desktop | =5.0r8.1 | |
Pulse Secure Desktop | =5.0r9.0 | |
Pulse Secure Desktop | =5.0r10.0 | |
Pulse Secure Desktop | =5.0r11.0 | |
Pulse Secure Desktop | =5.0r12.0 | |
Pulse Secure Desktop | =5.0r13.0 | |
Pulse Secure Desktop | =5.0r13.1 | |
Pulse Secure Desktop | =5.0r14.0 | |
Pulse Secure Desktop | =5.0r15.0 | |
Pulse Secure Desktop | =5.1r1.0 | |
Pulse Secure Desktop | =5.1r1.1 | |
Pulse Secure Desktop | =5.1r2.0 | |
Pulse Secure Desktop | =5.1r3.0 | |
Pulse Secure Desktop | =5.1r3.1 | |
Pulse Secure Desktop | =5.1r3.2 | |
Pulse Secure Desktop | =5.1r4.0 | |
Pulse Secure Desktop | =5.1r5.0 | |
Pulse Secure Desktop | =5.1r5.1 | |
Pulse Secure Desktop | =5.1r6.0 | |
Pulse Secure Desktop | =5.1r7.0 | |
Pulse Secure Desktop | =5.1r8.0 | |
Pulse Secure Desktop | =5.1r9.0 | |
Pulse Secure Desktop | =5.2r1.0 | |
Pulse Secure Desktop | =5.2r1.1 | |
Pulse Secure Desktop | =5.2r2.0 | |
Pulse Secure | =8.0r1.0 | |
Pulse Secure | =8.0r1.1 | |
Pulse Secure | =8.0r2.0 | |
Pulse Secure | =8.0r3.0 | |
Pulse Secure | =8.0r3.1 | |
Pulse Secure | =8.0r3.2 | |
Pulse Secure | =8.0r4.0 | |
Pulse Secure | =8.0r4.1 | |
Pulse Secure | =8.0r5.0 | |
Pulse Secure | =8.0r6.0 | |
Pulse Secure | =8.0r7.0 | |
Pulse Secure | =8.0r7.1 | |
Pulse Secure | =8.0r8.0 | |
Pulse Secure | =8.0r8.1 | |
Pulse Secure | =8.0r9.0 | |
Pulse Secure | =8.0r10.0 | |
Pulse Secure | =8.0r11.0 | |
Pulse Secure | =8.0r12.1 | |
Pulse Secure | =8.0r13.0 | |
Pulse Secure | =8.0r13.1 | |
Pulse Secure | =8.0r14.0 | |
Pulse Secure | =8.0r15.0 | |
Pulse Secure | =8.1r1.0 | |
Pulse Secure | =8.1r1.1 | |
Pulse Secure | =8.1r2.0 | |
Pulse Secure | =8.1r2.1 | |
Pulse Secure | =8.1r3.0 | |
Pulse Secure | =8.1r3.1 | |
Pulse Secure | =8.1r3.2 | |
Pulse Secure | =8.1r4.0 | |
Pulse Secure | =8.1r4.1 | |
Pulse Secure | =8.1r5.0 | |
Pulse Secure | =8.1r6.0 | |
Pulse Secure | =8.1r7.0 | |
Pulse Secure | =8.1r8.0 | |
Pulse Secure | =8.1r9.0 | |
Pulse Secure | =8.2r1.0 | |
Pulse Secure | =8.2r1.1 | |
Pulse Secure | =8.2r2.0 | |
Pulse Secure Installer Service | =7.4r1.0 | |
Pulse Secure Installer Service | =7.4r2.0 | |
Pulse Secure Installer Service | =7.4r3.0 | |
Pulse Secure Installer Service | =7.4r4.0 | |
Pulse Secure Installer Service | =7.4r5.0 | |
Pulse Secure Installer Service | =7.4r6.0 | |
Pulse Secure Installer Service | =7.4r7.0 | |
Pulse Secure Installer Service | =7.4r8.0 | |
Pulse Secure Installer Service | =7.4r9.0 | |
Pulse Secure Installer Service | =7.4r9.1 | |
Pulse Secure Installer Service | =7.4r9.2 | |
Pulse Secure Installer Service | =7.4r9.3 | |
Pulse Secure Installer Service | =7.4r10.0 | |
Pulse Secure Installer Service | =7.4r11.0 | |
Pulse Secure Installer Service | =7.4r11.1 | |
Pulse Secure Installer Service | =7.4r12.0 | |
Pulse Secure Installer Service | =7.4r13.0 | |
Pulse Secure Installer Service | =7.4r13.1 | |
Pulse Secure Installer Service | =7.4r13.2 | |
Pulse Secure Installer Service | =7.4r13.3 | |
Pulse Secure Installer Service | =7.4r13.4 | |
Pulse Secure Installer Service | =7.4r13.5 | |
Pulse Secure Installer Service | =7.4r13.6 | |
Pulse Secure Installer Service | =8.0r1.0 | |
Pulse Secure Installer Service | =8.0r1.1 | |
Pulse Secure Installer Service | =8.0r2.0 | |
Pulse Secure Installer Service | =8.0r3.0 | |
Pulse Secure Installer Service | =8.0r3.1 | |
Pulse Secure Installer Service | =8.0r3.2 | |
Pulse Secure Installer Service | =8.0r4.0 | |
Pulse Secure Installer Service | =8.0r4.1 | |
Pulse Secure Installer Service | =8.0r5.0 | |
Pulse Secure Installer Service | =8.0r6.0 | |
Pulse Secure Installer Service | =8.0r7.0 | |
Pulse Secure Installer Service | =8.0r7.1 | |
Pulse Secure Installer Service | =8.0r8.0 | |
Pulse Secure Installer Service | =8.0r8.1 | |
Pulse Secure Installer Service | =8.0r9.0 | |
Pulse Secure Installer Service | =8.0r10.0 | |
Pulse Secure Installer Service | =8.0r11.0 | |
Pulse Secure Installer Service | =8.0r12.1 | |
Pulse Secure Installer Service | =8.0r13.0 | |
Pulse Secure Installer Service | =8.0r13.1 | |
Pulse Secure Installer Service | =8.0r14.0 | |
Pulse Secure Installer Service | =8.0r15.0 | |
Pulse Secure Installer Service | =8.1r1.0 | |
Pulse Secure Installer Service | =8.1r1.1 | |
Pulse Secure Installer Service | =8.1r2.0 | |
Pulse Secure Installer Service | =8.1r2.1 | |
Pulse Secure Installer Service | =8.1r3.0 | |
Pulse Secure Installer Service | =8.1r3.1 | |
Pulse Secure Installer Service | =8.1r3.2 | |
Pulse Secure Installer Service | =8.1r4.0 | |
Pulse Secure Installer Service | =8.1r4.1 | |
Pulse Secure Installer Service | =8.1r5.0 | |
Pulse Secure Installer Service | =8.1r6.0 | |
Pulse Secure Installer Service | =8.1r7.0 | |
Pulse Secure Installer Service | =8.1r8.0 | |
Pulse Secure Installer Service | =8.1r9.0 | |
Pulse Secure Installer Service | =8.2r1.0 | |
Pulse Secure Installer Service | =8.2r1.1 | |
Pulse Secure Installer Service | =8.2r2.0 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2408 has been classified as a critical vulnerability, allowing restricted users to escalate privileges without any authentication.
To fix CVE-2016-2408, update to Pulse Secure Desktop version 5.2R2 or later and Pulse Secure Installer Service version 8.2R2 or later.
CVE-2016-2408 affects various versions of Pulse Secure Desktop, Pulse Secure Installer Service, and Odyssey Access Client prior to their respective updates.
CVE-2016-2408 facilitates privilege escalation attacks, potentially allowing unauthorized access to sensitive system functions.
Currently, the best approach for CVE-2016-2408 is to apply the relevant software updates as there are no effective workarounds available.