vulnerability
Pulse Secure Pulse Connect Secure: Remote desktop protocol (RDP) client restriction bypass issue (SA40166)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:N) | Feb 26, 2016 | Oct 28, 2020 | Feb 18, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:N)
Published
Feb 26, 2016
Added
Oct 28, 2020
Modified
Feb 18, 2025
Description
A security issue was discovered in the PCS Terminal Services Remote Desktop Protocol (RDP) client session restrictions feature. By exploiting this issue a malicious authenticated user could bypass security controls applied against their terminal services session. This issue is only exploitable by users who have a valid authenticated session to the PCS device as well as authenticating to the backend terminal services server.
Solution(s)
pulse-secure-pulse-connect-secure-upgrade-8_1r8pulse-secure-pulse-connect-secure-upgrade-8_2r1_1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.