CVE-2019-11539
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
26/04/2019
Last modified:
06/11/2025
Description
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ivanti:connect_secure:8.1:-:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r3.0:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:* | ||
| cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/154376/Pulse-Secure-8.1R15.1-8.2-8.3-9.0-SSL-VPN-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155277/Pulse-Secure-VPN-Arbitrary-Command-Execution.html
- http://packetstormsecurity.com/files/162092/Pulse-Secure-VPN-Arbitrary-Command-Execution.html
- http://www.securityfocus.com/bid/108073
- https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
- https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010
- https://www.kb.cert.org/vuls/id/927237
- http://packetstormsecurity.com/files/154376/Pulse-Secure-8.1R15.1-8.2-8.3-9.0-SSL-VPN-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155277/Pulse-Secure-VPN-Arbitrary-Command-Execution.html
- http://packetstormsecurity.com/files/162092/Pulse-Secure-VPN-Arbitrary-Command-Execution.html
- http://www.securityfocus.com/bid/108073
- https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
- https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010
- https://www.kb.cert.org/vuls/id/927237
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11539



