First published: Wed Jan 31 2018(Updated: )
The GUI component (aka PulseUI) in Pulse Secure Desktop Linux clients before PULSE5.2R9.2 and 5.3.x before PULSE5.3R4.2 does not perform strict SSL Certificate Validation. This can lead to the manipulation of the Pulse Connection set.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulse Secure Desktop Client for Linux | <5.2r9.2 | |
Pulse Secure Desktop Client for Linux | <5.3r4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6374 is considered a high severity vulnerability due to its potential to allow unauthorized manipulation of the Pulse Connection set.
To fix CVE-2018-6374, upgrade your Pulse Secure Desktop Linux Client to version PULSE5.2R9.2 or PULSE5.3R4.2 or later.
CVE-2018-6374 affects Pulse Secure Desktop Linux clients before versions PULSE5.2R9.2 and 5.3.x before PULSE5.3R4.2.
The consequences of CVE-2018-6374 include potential interception and manipulation of data transmitted through the Pulse Secure connection.
There are no documented workarounds for CVE-2018-6374; upgrading to a secure version is the recommended solution.