First published: Wed Oct 28 2020(Updated: )
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pulsesecure Pulse Secure Desktop Client | <9.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r2 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r3 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r3.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r4.2 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r5 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r6 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r7 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r7.1 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r8 | |
Pulsesecure Pulse Secure Desktop Client | =9.1-r8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8255 is a vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface that could allow an authenticated attacker to perform an arbitrary file reading.
An attacker can exploit CVE-2020-8255 by exploiting an arbitrary file reading vulnerability in the Pulse Connect Secure admin web interface.
The severity of CVE-2020-8255 is medium with a severity value of 4.9.
Pulsesecure Pulse Secure Desktop Client version < 9.1R9 is affected by CVE-2020-8255.
The vulnerability in CVE-2020-8255 can be fixed by applying the encrypted URL blacklisting patch provided by Pulse Secure.