Pulse Connect Secure Cross-Site Request Forgery (SA40793)

Medium Nessus Plugin ID 103052


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, the version of Pluse Connect Secure running on the remote host is affected by a cross-site request forgery vulnerability in diag.cgi. This vulnerability may allow remote attackers to hijack the authentication of administrators for requests to start tcpdump.


Upgrade to or later.

See Also


Plugin Details

Severity: Medium

ID: 103052

File Name: junos_pulse_sa_40793.nasl

Version: $Revision: 1.2 $

Type: local

Family: Misc.

Published: 2017/09/08

Modified: 2018/02/08

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P


Base Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Vulnerability Information

CPE: cpe:/o:juniper:ive_os, cpe:/a:juniper:junos_pulse_secure_access_service, cpe:/a:juniper:junos_pulse_access_control_service

Required KB Items: Host/Juniper/IVE OS/Version

Patch Publication Date: 2017/08/29

Vulnerability Publication Date: 2017/08/29

Reference Information

CVE: CVE-2017-11455

BID: 100530