vulnerability
Pulse Secure Pulse Connect Secure: CVE-2016-2110: [Pulse Secure] Badlock security advisory (SA40196)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | 2016-04-25 | 2020-10-28 | 2024-02-15 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
2016-04-25
Added
2020-10-28
Modified
2024-02-15
Description
The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
Solution(s)
pulse-secure-pulse-connect-secure-upgrade-8_1r10pulse-secure-pulse-connect-secure-upgrade-8_2r5
References
- CVE-2016-2110
- https://attackerkb.com/topics/CVE-2016-2110
- DEBIAN-DSA-3548
- REDHAT-RHSA-2016:0611
- REDHAT-RHSA-2016:0612
- REDHAT-RHSA-2016:0613
- REDHAT-RHSA-2016:0614
- REDHAT-RHSA-2016:0618
- REDHAT-RHSA-2016:0619
- REDHAT-RHSA-2016:0620
- REDHAT-RHSA-2016:0621
- REDHAT-RHSA-2016:0623
- REDHAT-RHSA-2016:0624
- REDHAT-RHSA-2016:0625
- URL-https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.