First published: Sat Mar 16 2019(Updated: )
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulse Secure Desktop Client for macOS | =4.0-r1.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r10.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r11.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r11.1 | |
Pulse Secure Desktop Client for macOS | =4.0-r12.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r13.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r2.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r3.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r4.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r5.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r6.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r7.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r8.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r9.0 | |
Pulse Secure Desktop Client for macOS | =4.0-r9.1 | |
Pulse Secure Desktop Client for macOS | =4.0-r9.2 | |
Pulse Secure Desktop Client for macOS | =5.1-r1.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r1.1 | |
Pulse Secure Desktop Client for macOS | =5.1-r10.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r11.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r11.1 | |
Pulse Secure Desktop Client for macOS | =5.1-r12.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r13.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r14.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r2.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r3.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r3.1 | |
Pulse Secure Desktop Client for macOS | =5.1-r4.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r5.1 | |
Pulse Secure Desktop Client for macOS | =5.1-r6.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r7.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r8.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r9.0 | |
Pulse Secure Desktop Client for macOS | =5.1-r9.1 | |
Pulse Secure Desktop Client for macOS | =5.1r-3.2 | |
Pulse Secure Desktop Client for macOS | =5.1r-5.0 | |
Pulse Secure Desktop Client for macOS | =5.3-r1 | |
Pulse Secure Desktop Client for macOS | =5.3-r1.1 | |
Pulse Secure Desktop Client for macOS | =5.3-r2 | |
Pulse Secure Desktop Client for macOS | =5.3-r3 | |
Pulse Secure Desktop Client for macOS | =5.3-r4 | |
Pulse Secure Desktop Client for macOS | =5.3-r4.1 | |
Pulse Secure Desktop Client for macOS | =5.3-r4.2 | |
Pulse Secure Desktop Client for macOS | =5.3-r5 | |
Pulse Secure Desktop Client for macOS | =5.3-r5.2 | |
Pulse Secure Desktop Client for macOS | =5.3-r6 | |
Pulse Secure Desktop Client for macOS | =5.3-r7 | |
Pulse Secure Desktop Client for macOS | =9.0-r1 | |
Pulse Secure Desktop Client for macOS | =9.0-r2 | |
Pulse Secure Desktop Client for macOS | =9.0-r2.1 | |
Pulse Secure Desktop Client for macOS | =9.0-r3 | |
Pulse Secure Desktop Client for macOS | =9.0-r3.2 | |
Pulse Secure Desktop Client for macOS | =9.0-r4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20812 has a severity rating determined by its potential for information exposure related to IPv6 DNS traffic.
To fix CVE-2018-20812, upgrade to Pulse Secure Desktop Client version 9.0R5 or later.
CVE-2018-20812 affects Pulse Secure Desktop Client versions 9.0R1 and earlier, specifically on macOS.
CVE-2018-20812 can cause information exposure by allowing IPv6 DNS traffic to bypass the VPN tunnel.
Users operating dual-stack (IPv4/IPv6) endpoints with the affected versions of Pulse Secure software are at risk from CVE-2018-20812.