Pulse Secure
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Pulse Secure product.
RSS Feeds for Pulse Secure security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Pulse Secure products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Pulse Secure Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2025 there have been 0 vulnerabilities in Pulse Secure. Pulse Secure did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 4 | 6.90 |
2021 | 13 | 7.69 |
2020 | 30 | 6.70 |
2019 | 22 | 7.56 |
2018 | 18 | 7.19 |
It may take a day or so for new Pulse Secure vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pulse Secure Security Vulnerabilities
An unauthenticated attacker
CVE-2022-35258
7.5 - High
- December 05, 2022
An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.
Incorrect Calculation
An unauthenticated attacker
CVE-2022-35254
7.5 - High
- December 05, 2022
An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.
Resource Exhaustion
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling
CVE-2022-21826
5.4 - Medium
- September 30, 2022
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
HTTP Request Smuggling
In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12
CVE-2021-44720
7.2 - High
- August 12, 2022
In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.
Use of Hard-coded Credentials
A vulnerability in Pulse Connect Secure before 9.1R12.1 could
CVE-2021-22965
7.5 - High
- November 19, 2021
A vulnerability in Pulse Connect Secure before 9.1R12.1 could allow an unauthenticated administrator to causes a denial of service when a malformed request is sent to the device.
Resource Exhaustion
A vulnerability in Pulse Connect Secure before 9.1R12 could
CVE-2021-22935
7.2 - High
- August 16, 2021
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter.
Command Injection
A vulnerability in Pulse Connect Secure before 9.1R12 could
CVE-2021-22937
7.2 - High
- August 16, 2021
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform a file write via a maliciously crafted archive uploaded in the administrator web interface.
Unrestricted File Upload
A vulnerability in Pulse Connect Secure before 9.1R12 could
CVE-2021-22938
7.2 - High
- August 16, 2021
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter in the administrator web console.
Command Injection
A vulnerability in Pulse Connect Secure before 9.1R12 could
CVE-2021-22936
6.1 - Medium
- August 16, 2021
A vulnerability in Pulse Connect Secure before 9.1R12 could allow a threat actor to perform a cross-site script attack against an authenticated administrator via an unsanitized web parameter.
XSS
A vulnerability in Pulse Connect Secure before 9.1R12 could
CVE-2021-22934
7.2 - High
- August 16, 2021
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator or compromised Pulse Connect Secure device in a load-balanced configuration to perform a buffer overflow via a malicious crafted web request.
Classic Buffer Overflow
A vulnerability in Pulse Connect Secure before 9.1R12 could
CVE-2021-22933
6.5 - Medium
- August 16, 2021
A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request.
Directory traversal
A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4
CVE-2021-22894
8.8 - High
- May 27, 2021
A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.
Buffer Overflow
A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4
CVE-2021-22899
8.8 - High
- May 27, 2021
A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature
Command Injection
A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X
CVE-2021-22908
8.8 - High
- May 27, 2021
A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user. As of version 9.1R3, this permission is not enabled by default.
Classic Buffer Overflow
A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4
CVE-2021-22900
7.2 - High
- May 27, 2021
A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface.
Incorrect Resource Transfer Between Spheres
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could
CVE-2021-31922
7.5 - High
- May 14, 2021
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
HTTP Request Smuggling
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure
CVE-2021-22893
10 - Critical
- April 23, 2021
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
Dangling pointer
A vulnerability in the Pulse Secure Desktop Client < 9.1R9
CVE-2020-8240
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could
CVE-2020-8241
7.5 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server.
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack
CVE-2020-8239
9.8 - Critical
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could
CVE-2020-8248
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could
CVE-2020-8249
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.
Classic Buffer Overflow
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could
CVE-2020-8250
7.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users
CVE-2020-8254
8.8 - High
- October 28, 2020
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Secure, see below recommendation(s):Disable Dynamic certificate trust for PDC.
Directory traversal
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting
CVE-2020-8255
4.9 - Medium
- October 28, 2020
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could
CVE-2020-8260
7.2 - High
- October 28, 2020
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
Unrestricted File Upload
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.
CVE-2020-8261
4.3 - Medium
- October 28, 2020
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.
Classic Buffer Overflow
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could
CVE-2020-8262
6.1 - Medium
- October 28, 2020
A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) and Open Redirection for authenticated user web interface.
XSS
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could
CVE-2020-8263
5.4 - Medium
- October 28, 2020
A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.
XSS
An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9
CVE-2020-15352
7.2 - High
- October 27, 2020
An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9 allows remote authenticated admins to conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.
XXE
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could
CVE-2020-8256
4.9 - Medium
- September 30, 2020
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to gain arbitrary file reading access through Pulse Collaboration via XML External Entity (XXE) vulnerability.
XXE
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could
CVE-2020-8243
7.2 - High
- September 30, 2020
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.
Code Injection
A vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure < 9.1R8.2 could
CVE-2020-8238
6.1 - Medium
- September 30, 2020
A vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure < 9.1R8.2 could allow attackers to conduct Cross-Site Scripting (XSS).
XSS
A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.
CVE-2020-8204
6.1 - Medium
- July 30, 2020
A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.
XSS
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which
CVE-2020-8221
4.9 - Medium
- July 30, 2020
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which allows an authenticated attacker to read arbitrary files via the administrator web interface.
Directory traversal
An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB
CVE-2020-8206
8.1 - High
- July 30, 2020
An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB that allows an attacker with a users primary credentials to bypass the Google TOTP.
authentification
An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8
CVE-2020-8216
4.3 - Medium
- July 30, 2020
An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8 allowed an authenticated end-users to find meeting details, if they know the Meeting ID.
A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8
CVE-2020-8217
5.4 - Medium
- July 30, 2020
A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8 allowed attackers to exploit in the URL used for Citrix ICA.
XSS
A code injection vulnerability exists in Pulse Connect Secure <9.1R8
CVE-2020-8218
7.2 - High
- July 30, 2020
A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.
Code Injection
An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8
CVE-2020-8219
7.2 - High
- July 30, 2020
An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to change the password of a full administrator.
Incorrect Default Permissions
A denial of service vulnerability exists in Pulse Connect Secure <9.1R8
CVE-2020-8220
6.5 - Medium
- July 30, 2020
A denial of service vulnerability exists in Pulse Connect Secure <9.1R8 that allows an authenticated attacker to perform command injection via the administrator web which can cause DOS.
Resource Exhaustion
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8
CVE-2020-8222
6.8 - Medium
- July 30, 2020
A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting.
Directory traversal
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8
CVE-2020-15408
4.6 - Medium
- July 28, 2020
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.
AuthZ
An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8
CVE-2020-12880
5.5 - Medium
- July 27, 2020
An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.)
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM)
CVE-2020-13162
7 - High
- June 16, 2020
A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.
TOCTTOU
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06
CVE-2020-11581
8.1 - High
- April 06, 2020
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, allows a man-in-the-middle attacker to perform OS command injection attacks (against a client) via shell metacharacters to the doCustomRemediateInstructions method, because Runtime.getRuntime().exec() is used.
Shell injection
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06
CVE-2020-11582
8.8 - High
- April 06, 2020
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, launches a TCP server that accepts local connections on a random port. This can be reached by local HTTP clients, because up to 25 invalid lines are ignored, and because DNS rebinding can occur. (This server accepts, for example, a setcookie command that might be relevant to CVE-2020-11581 exploitation.)
Exposure of Resource to Wrong Sphere
A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12.
CVE-2018-20811
5.3 - Medium
- June 28, 2019
A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12.
Information Disclosure
A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5
CVE-2018-20809
7.5 - High
- June 28, 2019
A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5. This is not applicable to PCS 8.1RX.
Improper Input Validation
An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization
CVE-2018-20808
6.1 - Medium
- June 28, 2019
An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization. This is not applicable to 8.1RX.
XSS