Lucene search

K
cveHackeroneCVE-2020-8239
HistoryOct 28, 2020 - 1:15 p.m.

CVE-2020-8239

2020-10-2813:15:12
hackerone
web.nvd.nist.gov
53
vulnerability
pulse secure
privilege escalation
registry
server side upgrade
nvd
cve-2020-8239

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.002

Percentile

60.7%

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.

Affected configurations

Nvd
Vulners
Node
pulsesecurepulse_secure_desktop_clientRange<9.1linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r1linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r2linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r3linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r3.1linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r4linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r4.1linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r4.2linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r5linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r6linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r7linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r7.1linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r8linux
OR
pulsesecurepulse_secure_desktop_clientMatch9.1r8.2linux
VendorProductVersionCPE
pulsesecurepulse_secure_desktop_client*cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:*:*:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r1:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r2:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r3:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r3.1:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r4:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r4.1:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r4.2:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r5:*:*:*:linux:*:*
pulsesecurepulse_secure_desktop_client9.1cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r6:*:*:*:linux:*:*
Rows per page:
1-10 of 141

CNA Affected

[
  {
    "product": "Pulse Secure Desktop Cient",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "9.1R9"
      }
    ]
  }
]

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.002

Percentile

60.7%