Rapid7 Vulnerability & Exploit Database

Pulse Secure Pulse Connect Secure: CVE-2013-3970: Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) Internal and test Certificate Authority Root Servers unintentionally added to Trusted CA list (JSA10571)

Back to Search

Pulse Secure Pulse Connect Secure: CVE-2013-3970: Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) Internal and test Certificate Authority Root Servers unintentionally added to Trusted CA list (JSA10571)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
06/13/2013
Created
10/28/2020
Added
10/28/2020
Modified
10/28/2020

Description

Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS 7.0r2 through 7.0r8 and 7.1r1 through 7.1r5 and Junos Pulse Access Control Service (aka UAC) with UAC OS 4.1r1 through 4.1r5 include a test Certification Authority (CA) certificate in the Trusted Server CAs list, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging control over that test CA.

Solution(s)

  • pulse-secure-pulse-connect-secure-upgrade-7_0r2
  • pulse-secure-pulse-connect-secure-upgrade-7_0r8
  • pulse-secure-pulse-connect-secure-upgrade-7_1r1
  • pulse-secure-pulse-connect-secure-upgrade-7_1r5
  • pulse-secure-pulse-connect-secure-upgrade-7_1r7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;