Lucene search

K
thnThe Hacker NewsTHN:FA7EFA3A74BF3490AD84EA169EA6C4CA
HistoryMay 25, 2021 - 7:37 a.m.

New High-Severity Vulnerability Reported in Pulse Connect Secure VPN

2021-05-2507:37:00
The Hacker News
thehackernews.com
462

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

Pulse Connect Secure

Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an authenticated remote attacker to execute arbitrary code with elevated privileges.

β€œBuffer Overflow in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user,” the company said in an alert published on May 14. β€œAs of version 9.1R3, this permission is not enabled by default.”

The flaw, identified as CVE-2021-22908, has a CVSS score of 8.5 out of a maximum of 10 and impacts Pulse Connect Secure versions 9.0Rx and 9.1Rx. In a report detailing the vulnerability, the CERT Coordination Center said the issue stems from the gateway’s ability to connect to Windows file shares through a number of CGI endpoints that could be leveraged to carry out the attack.

β€œWhen specifying a long server name for some SMB operations, the β€˜smbclt’ application may crash due to either a stack buffer overflow or a heap buffer overflow, depending on how long of a server name is specified,” CERT/CC detailed in a vulnerability note published on Monday, adding it was able to trigger the vulnerable code by targeting the CGI script β€˜/dana/fb/smb/wnf.cgi.’

Pulse Secure customers are recommended to upgrade to PCS Server version 9.1R.11.5 when it becomes available. In the interim, Ivanti has published a workaround file (β€˜Workaround-2105.xml’) that can be imported to disable the Windows File Share Browser feature by adding the vulnerable URL endpoints to a blocklist and thus activate necessary mitigations to protect against this vulnerability.

It bears noting that users running PCS versions 9.1R11.3 or below would need to import a different file named β€˜Workaround-2104.xml,’ necessitating that the PCS system is running 9.1R11.4 before applying the safeguards in β€˜Workaround-2105.xml.’

Pulse Connect Secure

While Ivanti has recommended turning off Windows File Browser on the Admin UI by disabling the option β€˜Files, Window [sic]’ for specific user roles, CERT/CC found the steps were inadequate to protect against the flaw during its testing.

β€œThe vulnerable CGI endpoints are still reachable in ways that will trigger the β€˜smbclt’ application to crash, regardless of whether the β€˜Files, Windows’ user role is enabled or not,” it noted.

β€œAn attacker would need a valid DSID and β€˜xsauth’ value from an authenticated user to successfully reach the vulnerable code on a PCS server that has an open Windows File Access policy.”

The disclosure of a new flaw arrives weeks after the Utah-based IT software company patched multiple critical security vulnerabilities in Pulse Connect Secure products, including CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900, the first of which was found to be actively exploited in the wild by at least two different threat actors.

Found this article interesting? Follow THN on Facebook, Twitter ο‚™ and LinkedIn to read more exclusive content we post.

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C