First published: Wed Oct 28 2020(Updated: )
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pulsesecure Pulse Secure Desktop Client | <9.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r2 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r3 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r3.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4.2 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r5 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r6 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r7 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r7.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r8 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Pulse Secure Desktop Client vulnerability is CVE-2020-8239.
The CVE-2020-8239 vulnerability has a severity score of 9.8 out of 10, making it critical.
Pulse Secure Desktop Client versions < 9.1R9 are affected by CVE-2020-8239.
To fix CVE-2020-8239, update Pulse Secure Desktop Client to version 9.1R9 or higher.
You can find more information about CVE-2020-8239 on the Pulse Secure Knowledge Base: [https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601](https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601)