Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ AA20-010A: Continued Exploitation of Pulse Secure VPN Vulnerability

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š AA20-010A: Continued Exploitation of Pulse Secure VPN Vulnerability


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: us-cert.gov

Original release date: January 10, 2020

Summary

Unpatched Pulse Secure VPN servers continue to be an attractive target for malicious actors. Affected organizations that have not applied the software patch to fix a remote code execution (RCE) vulnerability, known as CVE-2019-11510, can become compromised in an attack. [1]

Although Pulse Secure [2] disclosed the vulnerability and provided software patches for the various affected products in April 2019, the Cybersecurity and Infrastructure Security Agency (CISA) continues to observe wide exploitation of CVE-2019-11510. [3] [4] [5]

CISA expects to see continued attacks exploiting unpatched Pulse Secure VPN environments and strongly urges users and administrators to upgrade to the corresponding fixes. [6]

Timelines of Specific Events

  • April 24, 2019 โ€“ Pulse Secure releases initial advisory and software updates addressing multiple vulnerabilities.
  • May 28, 2019 โ€“ Large commercial vendors get reports of vulnerable VPN through HackerOne.
  • July 31, 2019 โ€“ Full RCE use of exploit demonstrated using the admin session hash to get complete shell.
  • August 8, 2019 โ€“ Meh Chang and Orange Tsai demonstrate the VPN issues across multiple vendors (Pulse Secure) with detailed attack on active VPN exploitation.
  • August 24, 2019 โ€“ Bad Packets identifies over 14,500 vulnerable VPN servers globally still unpatched and in need of an upgrade.
  • October 7, 2019 โ€“ The National Security Agency (NSA) produces a Cybersecurity Advisory on Pulse Secure and other VPN products being targeted actively by advanced persistent threat actors.
  • October 16, 2019 โ€“ The CERT Coordination Center (CERT/CC) releases Vulnerability Note VU#927237: Pulse Secure VPN contains multiple vulnerabilities.
  • January 2020 โ€“ Media reports cybercriminals now targeting unpatched Pulse Secure VPN servers to install REvil (Sodinokibi) ransomware. ย ย 

Technical Details

Impact

A remote, unauthenticated attacker may be able to compromise a vulnerable VPN server. The attacker may be able to gain access to all active users and their plain-text credentials. It may also be possible for the attacker to execute arbitrary commands on each VPN client as it successfully connects to the VPN server.

Affected versions:

  • Pulse Connect Secure 9.0R1 - 9.0R3.3
  • Pulse Connect Secure 8.3R1 - 8.3R7
  • Pulse Connect Secure 8.2R1 - 8.2R12
  • Pulse Connect Secure 8.1R1 - 8.1R15
  • Pulse Policy Secure 9.0R1 - 9.0R3.1
  • Pulse Policy Secure 5.4R1 - 5.4R7
  • Pulse Policy Secure 5.3R1 - 5.3R12
  • Pulse Policy Secure 5.2R1 - 5.2R12
  • Pulse Policy Secure 5.1R1 - 5.1R15

Mitigations

This vulnerability has no viable workarounds except for applying the patches provided by the vendor and performing required system updates.

CISA strongly urges users and administrators to upgrade to the corresponding fixes. [7]

References

Revisions

  • January 10, 2020: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

...



๐Ÿ“Œ AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching


๐Ÿ“ˆ 75.89 Punkte

๐Ÿ“Œ AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching


๐Ÿ“ˆ 75.89 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure/Pulse Policy Secure download.cgi Open Redirect


๐Ÿ“ˆ 54.85 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure/Pulse Policy Secure login.cgi Host Header privilege escalation


๐Ÿ“ˆ 54.85 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure/Pulse Policy Secure Admin Web Interface privilege escalation


๐Ÿ“ˆ 54.85 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure/Pulse Policy Secure Cluster Synchronization weak encryption


๐Ÿ“ˆ 54.85 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure/Pulse Policy Secure Web Server Message Crash denial of service


๐Ÿ“ˆ 54.85 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure/Pulse Policy Secure Psaldownload.cgi cross site scripting


๐Ÿ“ˆ 54.85 Punkte

๐Ÿ“Œ Pulse Secure fixes zero-day in Pulse Connect Secure (PCS) SSL VPN actively exploited


๐Ÿ“ˆ 43.05 Punkte

๐Ÿ“Œ Juniper Pulse Secure PSA5000/Pulse Secure PSA7000 BIOS Firmware unknown vulnerability


๐Ÿ“ˆ 39.8 Punkte

๐Ÿ“Œ Vuln: Pulse Connect Secure and Pulse Policy Secure Multiple Security Vulnerabilities


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R15.0/8.2R12.0/8.3R7.0/9.0R3.3 Permission File Upload privilege escalation


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Connect Secure/Pulse Policy Secure diag.cgi cross site request forgery


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1.R15.0/8.2R12.0/8.3R7.0/9.0R3.3 Admin Web Interface command injection


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Connect Secure/Pulse Policy Secure diag.cgi Cross Site Request Forgery


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.0R16/8.1R12/8.2R8/8.3R2 End User Portal custompage.cgi Parameter cross site scripting


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.3R3 Web Server Stack-based memory corruption


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R13/8.2R10/8.3R4 XML Data XML Document Memory Consumption denial of service


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure Session Token Replay weak authentication


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R15.0/8.3R7.0/9.0R3.3 Web Console cross site scripting


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure bis 8.3R3 Web Server Stack-based Pufferรผberlauf


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R15.0/8.2R12.0/8.3R7.0/9.0R3.3 Admin Web Interface Message Stack-based memory corruption


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.2R12.0/8.3R7.0/9.0R3.3 SAML Authentication information disclosure


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.3R7.0/9.0R3.3 Session Hijacking weak authentication


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1.R15.0/8.2R12.0/8.3R7.0/9.0R3.3 NFS privilege escalation


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R15.0/8.2R12.0/8.3R7.0/9.0R3.3 Admin Web Interface directory traversal


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.3R7.0/9.0R2 Application Launcher Page cross site scripting


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure bis 8.0R16/8.1R12/8.2R8/8.3R2 End User Portal custompage.cgi Parameter Cross Site Scripting


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.3R2 rd.cgi Header cross site scripting


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R11/8.2R8/8.3R2 URL welcome.cgi Parameter cross site scripting


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure 8.3R1 login_meeting.cgi privilege escalation


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Secure Desktop up to 9.0R1 IPv6 DNS information disclosure


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 8.1R11/8.3R1 RPC Service information disclosure


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure bis 8.1R13/8.2R10/8.3R4 XML Data XML Document Memory Consumption Denial of Service


๐Ÿ“ˆ 36.57 Punkte

๐Ÿ“Œ Pulse Secure Pulse Connect Secure up to 2020-04-06 Applet tncc.jar authentication


๐Ÿ“ˆ 36.57 Punkte











matomo