![]() ![]() VSP-Host monitors processes that are spawned which are not part of a set of whitelisted process. The Virsec Security Platform (VSP)-Web’s path traversal feature will detect this exploit and will prevent this attack. PDC is popular client which is used by lot of enterprises to connect to their corporate network and perform critical and confidential tasks, any exploit of this vulnerability will compromise the whole corporate data. It provides a very user friendly experience on mobile and desktop to connect to VPN, BYOD, etc. Pulse Secure Desktop client (PDC) is One universal client for Pulse Connect Secure, Pulse Policy Secure and Pulse Workspace. The exposure window is therefore 6 months. The earliest vulnerable version was released on 05/2020. The CVSS Base Score is 8.8 (High) Affected Version Watch the video to learn more about this and other important vulnerabilities. The exploitation does not need any form of authentication. The manipulation with an unknown input leads to a directory traversal vulnerability. The exploitation appears to be easy. Affected by this vulnerability is an unknown function of the component Dynamic Certificate Trust. This vulnerability only affects Windows PDC. Vulnerability SummaryĪ vulnerability in the Pulse Connect Secure, Pulse Policy Secure, Pulse Secure Desktop Client Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. The Virsec Security Research Lab provides detailed analysis on recent and notable security vulnerabilities. Virsec Security Research Lab Vulnerability Analysis ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |