First published: Mon Jul 27 2020(Updated: )
An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulse Secure Pulse Connect Secure | <=9.0 | |
Pulse Secure Pulse Connect Secure | =9.1 | |
Pulse Secure Pulse Connect Secure | =9.1-r1 | |
Pulse Secure Pulse Connect Secure | =9.1-r2 | |
Pulse Secure Pulse Connect Secure | =9.1-r3 | |
Pulse Secure Pulse Connect Secure | =9.1-r4 | |
Pulse Secure Pulse Connect Secure | =9.1-r4.1 | |
Pulse Secure Pulse Connect Secure | =9.1-r4.2 | |
Pulse Secure Pulse Connect Secure | =9.1-r4.3 | |
Pulse Secure Pulse Connect Secure | =9.1-r5 | |
Pulse Secure Pulse Connect Secure | =9.1-r6 | |
Pulse Secure Pulse Connect Secure | =9.1-r7 | |
Pulse Policy Secure | <=9.0 | |
Pulse Policy Secure | =9.1-r1 | |
Pulse Policy Secure | =9.1-r2 | |
Pulse Policy Secure | =9.1-r3 | |
Pulse Policy Secure | =9.1-r3.1 | |
Pulse Policy Secure | =9.1-r4 | |
Pulse Policy Secure | =9.1-r4.1 | |
Pulse Policy Secure | =9.1-r4.2 | |
Pulse Policy Secure | =9.1-r5 | |
Pulse Policy Secure | =9.1-r6 | |
Pulse Policy Secure | =9.1-r7 | |
Ivanti Connect Secure (ICS) VPN | =9.1 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r1 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r2 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r3 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4.1 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4.2 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r4.3 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r5 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r6 | |
Ivanti Connect Secure (ICS) VPN | =9.1-r7 | |
Pulse Policy Secure | =9.1-r1 | |
Pulse Policy Secure | =9.1-r2 | |
Pulse Policy Secure | =9.1-r3 | |
Pulse Policy Secure | =9.1-r3.1 | |
Pulse Policy Secure | =9.1-r4 | |
Pulse Policy Secure | =9.1-r4.1 | |
Pulse Policy Secure | =9.1-r4.2 | |
Pulse Policy Secure | =9.1-r5 | |
Pulse Policy Secure | =9.1-r6 | |
Pulse Policy Secure | =9.1-r7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identifier for this issue is CVE-2020-12880.
The severity of CVE-2020-12880 is medium with a CVSS score of 5.5.
Pulse Connect Secure versions up to and including 9.1 and Pulse Policy Secure versions up to and including 9.1 are affected by this vulnerability.
This vulnerability can be exploited by manipulating a certain kernel boot parameter to drop into a root shell during the pre-install phase.
More information about this vulnerability can be found on the Pulse Secure Knowledge Base at the following links: [Link 1](https://kb.pulsesecure.net/?atype=sa), [Link 2](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516).