First published: Thu May 26 2016(Updated: )
Pulse Connect Secure (PCS) 8.2 before 8.2r1, 8.1 before 8.1r3, 8.0 before 8.0r11, and 7.4 before 7.4r13.4 allow remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulse Secure Pulse Connect Secure | =8.1 | |
Pulse Secure Pulse Connect Secure | =8.1r1.0 | |
Pulse Secure Pulse Connect Secure | =8.2 | |
Pulse Secure Pulse Connect Secure | =8.0 | |
Pulse Secure Pulse Connect Secure | =7.4 | |
Ivanti Connect Secure (ICS) VPN | =8.1 | |
Ivanti Connect Secure (ICS) VPN | =8.2 | |
Ivanti Connect Secure (ICS) VPN | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4786 has a medium severity level, primarily due to its potential for causing denial of service.
To resolve CVE-2016-4786, you should update your Pulse Connect Secure to the latest patched version by following the vendor's security advisory.
The affected versions for CVE-2016-4786 include Pulse Connect Secure 8.2 before 8.2r1, 8.1 before 8.1r3, 8.0 before 8.0r11, and 7.4 before 7.4r13.4.
Yes, CVE-2016-4786 can be exploited remotely, allowing attackers to cause high CPU consumption.
The impact of CVE-2016-4786 on your system is a denial of service, which may lead to significant performance degradation.