Pulse Policy Secure Cross-Site Request Forgery (SA40793)

Medium Nessus Plugin ID 103053


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, the version of Pluse Policy Secure running on the remote host is affected by a cross-site request forgery vulnerability in diag.cgi. This vulnerability may allow remote attackers to hijack the authentication of administrators for requests to start tcpdump.


Upgrade to or later.

See Also


Plugin Details

Severity: Medium

ID: 103053

File Name: pulse_policy_secure-sa-40793.nasl

Version: $Revision: 1.2 $

Type: local

Family: Misc.

Published: 2017/09/08

Modified: 2018/02/08

Dependencies: 103054

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P


Base Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Vulnerability Information

CPE: cpe:/a:pulse_secure:pulse_policy_secure

Required KB Items: installed_sw/Pulse Policy Secure

Patch Publication Date: 2017/08/29

Vulnerability Publication Date: 2017/08/29

Reference Information

CVE: CVE-2017-11455

BID: 100530