First published: Fri Apr 12 2019(Updated: )
In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for exploitation to succeed.) This affects Pulse Desktop Client 5.x before Secure Desktop 5.3R7 and Pulse Desktop Client 9.x before Secure Desktop 9.0R3. It also affects (for Network Connect customers) Pulse Connect Secure 8.1 before 8.1R14, 8.3 before 8.3R7, and 9.0 before 9.0R3.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulsesecure Pulse Connect Secure | >=8.1r1.0<=8.1r14.0 | |
Pulsesecure Pulse Connect Secure | >=8.3r1<8.3r7 | |
Pulsesecure Pulse Connect Secure | >=9.0r1<9.0r3 | |
Pulsesecure Pulse Secure Desktop Client | >=5.0r1.0<5.3r7 | |
Pulsesecure Pulse Secure Desktop Client | >=9.0r1<9.0r3 | |
Ivanti Connect Secure | >=9.0r1<9.0r3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11213 is a vulnerability in Pulse Secure Pulse Desktop Client and Network Connect that allows an attacker to access session tokens and gain unauthorized access.
CVE-2019-11213 allows an attacker to replay and spoof sessions by accessing session tokens, resulting in unauthorized access.
CVE-2019-11213 has a severity rating of 8.1, which is classified as high.
Pulsesecure Pulse Connect Secure versions between 8.1r1.0 and 8.1r14.0, 8.3r1 to 8.3r7, and 9.0r1 to 9.0r3, as well as Pulse Secure Desktop Client versions between 5.0r1.0 and 5.3r7, and 9.0r1 to 9.0r3 are affected by CVE-2019-11213.
To fix CVE-2019-11213, it is recommended to upgrade to a fixed software version provided by Pulse Secure.