CVE-2021-22893
CVE Published | 2021-04-23 |
---|---|
Related CWE(s) | CWE-287: Improper Authentication, CWE-416: Use After Free |
Related Vendor(s) | pulsesecure, ivanti |
Related Product(s) | connect_secure, pulse_connect_secure |
Exploitation Reported (CISA KEV) | 2021-11-03 |
CVSS 3 Base Score | 10.0 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph
Threat Reports Related to CVE-2021-22893
Report
Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day
Reporting from Mandiant which discusses the exploitation of Pulse Secure VPN devices in 2021 and 12 malware families associated with the campaign. ...