Overview
Pulse Secure SSL VPN contains multiple vulnerabilities that can allow remote unauthenticated remote attacker to compromise the VPN server and connected clients.
Description
Pulse Secure released an out-of-cycle advisory along with software patches for the various affected products on April 24, 2019. This addressed a number of vulnerabilities including a Remote Code Execution (RCE) vulnerability with pre-authentication access. This vulnerability has no viable workarounds except for applying the patches provided by the vendor and performing required system updates. The CVE-2019-11510 has a CVSS score of 10. The CVEs listed in the advisory are: |
Impact
A remote, unauthenticated attacker may be able to compromise a vulnerable VPN server. The attacker may be able to gain access to all active users and their plain-text credentials. It may also be possible for the attacker to execute arbitrary commands on each VPN client as it successfully connects to the VPN server. |
Solution
There is no viable workaround except to apply the patch and updates provided by the vendor. It is incorrect to assume use of client certificates or two-factor authentication (2FA) can prevent CVE-2019-11510 RCE pre-auth vulnerability. Updates are available from Pulse Secure Advisory. |
CVE-2019-11508 and CVE-2019-11538 can be mitigated by disabling File Sharing on the Pulse Secure VPN appliance. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.4 | AV:N/AC:L/Au:N/C:C/I:C/A:N |
Temporal | 8.2 | E:H/RL:OF/RC:C |
Environmental | 8.2 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://cyber.gc.ca/en/alerts/active-exploitation-vpn-vulnerabilities
- https://github.com/projectzeroindia/CVE-2019-11510
- https://www.exploit-db.com/exploits/47297
- https://www.youtube.com/watch?v=v7JUMb70ON4
- https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
- https://media.defense.gov/2019/Oct/07/2002191601/-1/-1/0/CSA-MITIGATING-RECENT-VPN-VULNERABILITIES.PDF
Acknowledgements
This vulnerability was reported by Pulse Secure, who in turn credit Orange Tsai and Meh Chang from DEVCORE research team, and Jake Valletta from FireEye
This document was written by Vijay S Sarvepalli.
Other Information
CVE IDs: | CVE-2019-11510, CVE-2019-11509, CVE-2019-11508, CVE-2019-11507, CVE-2019-11543, CVE-2019-11542, CVE-2019-11541, CVE-2019-11540, CVE-2019-11539, CVE-2019-11538 |
Date Public: | 2019-04-28 |
Date First Published: | 2019-10-16 |
Date Last Updated: | 2019-10-23 02:35 UTC |
Document Revision: | 43 |