Pulse Connect Secure Multiple Vulnerabilities (SA44101)

High Nessus Plugin ID 124766


The remote host is affected by multiple vulnerabilities.


According to its self-reported version, the version of Pulse Connect Secure running on the remote host is affected by multiple vulnerabilities.

- An arbitrary file read vulnerability exists in PCS. An unauthenticated, remote attacker can exploit this, via specially crafted URI, to read arbitrary files and disclose sensitive information. (CVE-2019-11510)

- Multiple vulnerabilities are found in Ghostscript.(CVE-2018-16513 , CVE-2018-18284, CVE-2018-15911, CVE-2018-15910, CVE-2018-15909)

- A session hijacking vulnerability exists in PCS. An unauthenticated, remote attacker can exploit this, to perform actions in the user or administrator interface with the privileges of another user. (CVE-2019-11540)

- An authentication leaks seen in users using SAML authentication with the reuse existing NC (Pulse) session option.

- Multiple vulnerabilities found in the admin web interface of PCS.
(CVE-2019-11543, CVE-2019-11542, CVE-2019-11509, CVE-2019-11539)

- Multiple vulnerabilities found in Network File Share (NFS) of PCS , allows the attacker to read/write arbitrary files on the affected device. (CVE-2019-11538, CVE-2019-11508)

- A cross-site scripting (XSS) vulnerability exists in application launcher page due to improper validation of user-supplied input before returning it to users. An attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.

Refer to the vendor advisory for additional information.


Upgrade to the appropriate version referenced in the advisory.

See Also


Plugin Details

Severity: High

ID: 124766

File Name: pulse_connect_secure-sa-44101.nasl

Version: 1.10

Type: local

Family: Misc.

Published: 2019/05/10

Updated: 2020/07/31

Dependencies: 109921

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-11540

CVSS v2.0

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:pulse_secure:pulse_connect_secure

Required KB Items: installed_sw/Pulse Connect Secure

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2019/05/09

Vulnerability Publication Date: 2019/05/09

Exploitable With

Metasploit (Pulse Secure VPN Arbitrary Command Execution)

Elliot (Pulse Connect Secure File Disclosure)

Reference Information

CVE: CVE-2018-15909, CVE-2018-15910, CVE-2018-15911, CVE-2018-16513, CVE-2018-18284, CVE-2019-11507, CVE-2019-11508, CVE-2019-11509, CVE-2019-11510, CVE-2019-11538, CVE-2019-11539, CVE-2019-11540, CVE-2019-11541, CVE-2019-11542, CVE-2019-11543

BID: 105122, 107451, 108073

IAVA: 2019-A-0309-S, 0001-A-0001