Rapid7 Vulnerability & Exploit Database

Pulse Secure Pulse Connect Secure: CVE-2019-11213: Pulse Desktop Client and Network Connect improper handling of session cookies (SA44114)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Pulse Secure Pulse Connect Secure: CVE-2019-11213: Pulse Desktop Client and Network Connect improper handling of session cookies (SA44114)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
04/12/2019
Created
10/28/2020
Added
10/28/2020
Modified
02/15/2024

Description

In Pulse Secure Pulse Desktop Client and Network Connect, an attacker could access session tokens to replay and spoof sessions, and as a result, gain unauthorized access as an end user, a related issue to CVE-2019-1573. (The endpoint would need to be already compromised for exploitation to succeed.) This affects Pulse Desktop Client 5.x before Secure Desktop 5.3R7 and Pulse Desktop Client 9.x before Secure Desktop 9.0R3. It also affects (for Network Connect customers) Pulse Connect Secure 8.1 before 8.1R14, 8.3 before 8.3R7, and 9.0 before 9.0R3.

Solution(s)

  • pulse-secure-pulse-connect-secure-upgrade-8_3r7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;