First published: Fri Apr 23 2021(Updated: )
Ivanti Pulse Connect Secure contains a use-after-free vulnerability that allow a remote, unauthenticated attacker to execute code via license services.
Credit: support@hackerone.com support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pulsesecure Pulse Connect Secure | =9.0 | |
Pulsesecure Pulse Connect Secure | =9.0-r1 | |
Pulsesecure Pulse Connect Secure | =9.0-r2 | |
Pulsesecure Pulse Connect Secure | =9.0-r2.1 | |
Pulsesecure Pulse Connect Secure | =9.0-r3 | |
Pulsesecure Pulse Connect Secure | =9.0-r3.1 | |
Pulsesecure Pulse Connect Secure | =9.0-r3.2 | |
Pulsesecure Pulse Connect Secure | =9.0-r3.3 | |
Pulsesecure Pulse Connect Secure | =9.0-r3.5 | |
Pulsesecure Pulse Connect Secure | =9.0-r4 | |
Pulsesecure Pulse Connect Secure | =9.0-r4.1 | |
Pulsesecure Pulse Connect Secure | =9.0-r5.0 | |
Pulsesecure Pulse Connect Secure | =9.0-r6.0 | |
Pulsesecure Pulse Connect Secure | =9.1 | |
Pulsesecure Pulse Connect Secure | =9.1-r1 | |
Pulsesecure Pulse Connect Secure | =9.1-r10.0 | |
Pulsesecure Pulse Connect Secure | =9.1-r10.2 | |
Pulsesecure Pulse Connect Secure | =9.1-r11.0 | |
Pulsesecure Pulse Connect Secure | =9.1-r11.1 | |
Pulsesecure Pulse Connect Secure | =9.1-r11.3 | |
Pulsesecure Pulse Connect Secure | =9.1-r2 | |
Pulsesecure Pulse Connect Secure | =9.1-r3 | |
Pulsesecure Pulse Connect Secure | =9.1-r4 | |
Pulsesecure Pulse Connect Secure | =9.1-r4.1 | |
Pulsesecure Pulse Connect Secure | =9.1-r4.2 | |
Pulsesecure Pulse Connect Secure | =9.1-r4.3 | |
Pulsesecure Pulse Connect Secure | =9.1-r5 | |
Pulsesecure Pulse Connect Secure | =9.1-r6 | |
Pulsesecure Pulse Connect Secure | =9.1-r7 | |
Pulsesecure Pulse Connect Secure | =9.1-r8 | |
Pulsesecure Pulse Connect Secure | =9.1-r8.1 | |
Pulsesecure Pulse Connect Secure | =9.1-r8.2 | |
Pulsesecure Pulse Connect Secure | =9.1-r8.4 | |
Pulsesecure Pulse Connect Secure | =9.1-r9 | |
Pulsesecure Pulse Connect Secure | =9.1-r9.1 | |
Pulsesecure Pulse Connect Secure | =9.1-r9.2 | |
Ivanti Pulse Connect Secure | ||
Ivanti Connect Secure | =9.0 | |
Ivanti Connect Secure | =9.0-r1 | |
Ivanti Connect Secure | =9.0-r2 | |
Ivanti Connect Secure | =9.0-r2.1 | |
Ivanti Connect Secure | =9.0-r3 | |
Ivanti Connect Secure | =9.0-r3.1 | |
Ivanti Connect Secure | =9.0-r3.2 | |
Ivanti Connect Secure | =9.0-r3.3 | |
Ivanti Connect Secure | =9.0-r3.5 | |
Ivanti Connect Secure | =9.0-r4 | |
Ivanti Connect Secure | =9.0-r4.1 | |
Ivanti Connect Secure | =9.0-r5.0 | |
Ivanti Connect Secure | =9.0-r6.0 | |
Ivanti Connect Secure | =9.1 | |
Ivanti Connect Secure | =9.1-r1 | |
Ivanti Connect Secure | =9.1-r10.0 | |
Ivanti Connect Secure | =9.1-r10.2 | |
Ivanti Connect Secure | =9.1-r11.0 | |
Ivanti Connect Secure | =9.1-r11.1 | |
Ivanti Connect Secure | =9.1-r11.3 | |
Ivanti Connect Secure | =9.1-r2 | |
Ivanti Connect Secure | =9.1-r3 | |
Ivanti Connect Secure | =9.1-r4 | |
Ivanti Connect Secure | =9.1-r4.1 | |
Ivanti Connect Secure | =9.1-r4.2 | |
Ivanti Connect Secure | =9.1-r4.3 | |
Ivanti Connect Secure | =9.1-r5 | |
Ivanti Connect Secure | =9.1-r6 | |
Ivanti Connect Secure | =9.1-r7 | |
Ivanti Connect Secure | =9.1-r8 | |
Ivanti Connect Secure | =9.1-r8.1 | |
Ivanti Connect Secure | =9.1-r8.2 | |
Ivanti Connect Secure | =9.1-r8.4 | |
Ivanti Connect Secure | =9.1-r9 | |
Ivanti Connect Secure | =9.1-r9.1 | |
Ivanti Connect Secure | =9.1-r9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2021-22893.
The title of this vulnerability is Ivanti Pulse Connect Secure Use-After-Free Vulnerability.
The description of this vulnerability is that Ivanti Pulse Connect Secure contains a use-after-free vulnerability that allows a remote, unauthenticated attacker to execute code via license services.
The software affected by this vulnerability is Ivanti Pulse Connect Secure.
You can find more information about this vulnerability [here](https://www.cisa.gov/emergency-directive-21-03).
The Common Weakness Enumeration (CWE) ID of this vulnerability is CWE-416.