First published: Thu Sep 06 2018(Updated: )
In Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1, there is a Privilege Escalation Vulnerability with Dynamic Certificate Trust.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulsesecure Pulse Secure Desktop Client | =5.3r1 | |
Pulsesecure Pulse Secure Desktop Client | =5.3r1.1 | |
Pulsesecure Pulse Secure Desktop Client | =5.3r2 | |
Pulsesecure Pulse Secure Desktop Client | =5.3r3 | |
Pulsesecure Pulse Secure Desktop Client | =5.3r4 | |
Pulsesecure Pulse Secure Desktop Client | =5.3r4.1 | |
Pulsesecure Pulse Secure Desktop Client | =5.3r4.2 | |
Pulsesecure Pulse Secure Desktop Client | =5.3rx | |
Pulsesecure Pulse Secure Desktop Client | =9.0r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16261 is a Privilege Escalation Vulnerability with Dynamic Certificate Trust in Pulse Secure Pulse Desktop Client 5.3RX before 5.3R5 and 9.0R1.
CVE-2018-16261 has a severity rating of 6.8 (medium).
Pulse Secure Pulse Desktop Client versions 5.3RX before 5.3R5 and 9.0R1 are affected by CVE-2018-16261.
CVE-2018-16261 is associated with CWE-295 (Improper Certificate Validation).
To address CVE-2018-16261, it is recommended to update Pulse Secure Pulse Desktop Client to version 5.3R5 or 9.0R1.