First published: Wed Sep 12 2018(Updated: )
Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow attackers to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client. The attacker must interrupt the client's network connectivity, and trigger a connection to a crafted proxy server with an invalid SSL certificate that allows certification-manager access, leading to the ability to browse local files and execute local programs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulse Secure Desktop | =5.3r1.0 | |
Pulse Secure Desktop | =5.3r1.1 | |
Pulse Secure Desktop | =5.3r2.0 | |
Pulse Secure Desktop | =5.3r3.0 | |
Pulse Secure Desktop | =5.3r4.0 | |
Pulse Secure Desktop | =5.3r4.1 | |
Pulse Secure Desktop | =5.3r4.2 | |
Pulse Secure Desktop | =5.3rx | |
Pulse Secure Desktop | =9.0r1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7572 is a vulnerability in Pulse Secure Client that allows attackers to bypass Windows authentication and execute commands with the client's privileges.
The severity of CVE-2018-7572 is high, with a CVSS score of 6.8.
CVE-2018-7572 affects Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5 when configured to authenticate VPN users during Windows Logon.
To exploit CVE-2018-7572, the attacker must interrupt the client's network connection and execute commands with the privileges of the Pulse Secure Client.
Yes, Pulse Secure released a fix for CVE-2018-7572 in version 5.3R5 of Pulse Secure Client.