Pulse Secure Pulse Secure

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Pulse Secure product.

RSS Feeds for Pulse Secure security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Pulse Secure products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Pulse Secure Sorted by Most Security Vulnerabilities since 2018

Pulse Secure Desktop Client18 vulnerabilities

Pulse Secure Client2 vulnerabilities

Pulse Secure Desktop1 vulnerability

By the Year

In 2025 there have been 0 vulnerabilities in Pulse Secure. Pulse Secure did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 4 6.90
2021 13 7.69
2020 30 6.70
2019 22 7.56
2018 18 7.19

It may take a day or so for new Pulse Secure vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Pulse Secure Security Vulnerabilities

An unauthenticated attacker

CVE-2022-35258 7.5 - High - December 05, 2022

An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.

Incorrect Calculation

An unauthenticated attacker

CVE-2022-35254 7.5 - High - December 05, 2022

An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1.

Resource Exhaustion

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling

CVE-2022-21826 5.4 - Medium - September 30, 2022

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.

HTTP Request Smuggling

In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12

CVE-2021-44720 7.2 - High - August 12, 2022

In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.

Use of Hard-coded Credentials

A vulnerability in Pulse Connect Secure before 9.1R12.1 could

CVE-2021-22965 7.5 - High - November 19, 2021

A vulnerability in Pulse Connect Secure before 9.1R12.1 could allow an unauthenticated administrator to causes a denial of service when a malformed request is sent to the device.

Resource Exhaustion

A vulnerability in Pulse Connect Secure before 9.1R12 could

CVE-2021-22935 7.2 - High - August 16, 2021

A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter.

Command Injection

A vulnerability in Pulse Connect Secure before 9.1R12 could

CVE-2021-22937 7.2 - High - August 16, 2021

A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform a file write via a maliciously crafted archive uploaded in the administrator web interface.

Unrestricted File Upload

A vulnerability in Pulse Connect Secure before 9.1R12 could

CVE-2021-22938 7.2 - High - August 16, 2021

A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform command injection via an unsanitized web parameter in the administrator web console.

Command Injection

A vulnerability in Pulse Connect Secure before 9.1R12 could

CVE-2021-22936 6.1 - Medium - August 16, 2021

A vulnerability in Pulse Connect Secure before 9.1R12 could allow a threat actor to perform a cross-site script attack against an authenticated administrator via an unsanitized web parameter.

XSS

A vulnerability in Pulse Connect Secure before 9.1R12 could

CVE-2021-22934 7.2 - High - August 16, 2021

A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator or compromised Pulse Connect Secure device in a load-balanced configuration to perform a buffer overflow via a malicious crafted web request.

Classic Buffer Overflow

A vulnerability in Pulse Connect Secure before 9.1R12 could

CVE-2021-22933 6.5 - Medium - August 16, 2021

A vulnerability in Pulse Connect Secure before 9.1R12 could allow an authenticated administrator to perform an arbitrary file delete via a maliciously crafted web request.

Directory traversal

A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4

CVE-2021-22894 8.8 - High - May 27, 2021

A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room.

Buffer Overflow

A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4

CVE-2021-22899 8.8 - High - May 27, 2021

A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature

Command Injection

A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X

CVE-2021-22908 8.8 - High - May 27, 2021

A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user. As of version 9.1R3, this permission is not enabled by default.

Classic Buffer Overflow

A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4

CVE-2021-22900 7.2 - High - May 27, 2021

A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface.

Incorrect Resource Transfer Between Spheres

An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could

CVE-2021-31922 7.5 - High - May 14, 2021

An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.

HTTP Request Smuggling

Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure

CVE-2021-22893 10 - Critical - April 23, 2021

Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.

Dangling pointer

A vulnerability in the Pulse Secure Desktop Client < 9.1R9

CVE-2020-8240 7.8 - High - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 allows a restricted user on an endpoint machine can use system-level privileges if the Embedded Browser is configured with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could

CVE-2020-8241 7.5 - High - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server.

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack

CVE-2020-8239 9.8 - Critical - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could

CVE-2020-8248 7.8 - High - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could

CVE-2020-8249 7.8 - High - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to perform buffer overflow.

Classic Buffer Overflow

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could

CVE-2020-8250 7.8 - High - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users

CVE-2020-8254 8.8 - High - October 28, 2020

A vulnerability in the Pulse Secure Desktop Client < 9.1R9 has Remote Code Execution (RCE) if users can be convinced to connect to a malicious server. This vulnerability only affects Windows PDC.To improve the security of connections between Pulse clients and Pulse Connect Secure, see below recommendation(s):Disable Dynamic certificate trust for PDC.

Directory traversal

A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting

CVE-2020-8255 4.9 - Medium - October 28, 2020

A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.

A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could

CVE-2020-8260 7.2 - High - October 28, 2020

A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.

Unrestricted File Upload

A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.

CVE-2020-8261 4.3 - Medium - October 28, 2020

A vulnerability in the Pulse Connect Secure / Pulse Policy Secure < 9.1R9 is vulnerable to arbitrary cookie injection.

Classic Buffer Overflow

A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could

CVE-2020-8262 6.1 - Medium - October 28, 2020

A vulnerability in the Pulse Connect Secure / Pulse Policy Secure below 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) and Open Redirection for authenticated user web interface.

XSS

A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could

CVE-2020-8263 5.4 - Medium - October 28, 2020

A vulnerability in the authenticated user web interface of Pulse Connect Secure < 9.1R9 could allow attackers to conduct Cross-Site Scripting (XSS) through the CGI file.

XSS

An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9

CVE-2020-15352 7.2 - High - October 27, 2020

An XML external entity (XXE) vulnerability in Pulse Connect Secure (PCS) before 9.1R9 and Pulse Policy Secure (PPS) before 9.1R9 allows remote authenticated admins to conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request.

XXE

A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could

CVE-2020-8256 4.9 - Medium - September 30, 2020

A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to gain arbitrary file reading access through Pulse Collaboration via XML External Entity (XXE) vulnerability.

XXE

A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could

CVE-2020-8243 7.2 - High - September 30, 2020

A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.

Code Injection

A vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure < 9.1R8.2 could

CVE-2020-8238 6.1 - Medium - September 30, 2020

A vulnerability in the authenticated user web interface of Pulse Connect Secure and Pulse Policy Secure < 9.1R8.2 could allow attackers to conduct Cross-Site Scripting (XSS).

XSS

A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.

CVE-2020-8204 6.1 - Medium - July 30, 2020

A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.

XSS

A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which

CVE-2020-8221 4.9 - Medium - July 30, 2020

A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 which allows an authenticated attacker to read arbitrary files via the administrator web interface.

Directory traversal

An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB

CVE-2020-8206 8.1 - High - July 30, 2020

An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB that allows an attacker with a users primary credentials to bypass the Google TOTP.

authentification

An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8

CVE-2020-8216 4.3 - Medium - July 30, 2020

An information disclosure vulnerability in meeting of Pulse Connect Secure <9.1R8 allowed an authenticated end-users to find meeting details, if they know the Meeting ID.

A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8

CVE-2020-8217 5.4 - Medium - July 30, 2020

A cross site scripting (XSS) vulnerability in Pulse Connect Secure <9.1R8 allowed attackers to exploit in the URL used for Citrix ICA.

XSS

A code injection vulnerability exists in Pulse Connect Secure <9.1R8

CVE-2020-8218 7.2 - High - July 30, 2020

A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.

Code Injection

An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8

CVE-2020-8219 7.2 - High - July 30, 2020

An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to change the password of a full administrator.

Incorrect Default Permissions

A denial of service vulnerability exists in Pulse Connect Secure <9.1R8

CVE-2020-8220 6.5 - Medium - July 30, 2020

A denial of service vulnerability exists in Pulse Connect Secure <9.1R8 that allows an authenticated attacker to perform command injection via the administrator web which can cause DOS.

Resource Exhaustion

A path traversal vulnerability exists in Pulse Connect Secure <9.1R8

CVE-2020-8222 6.8 - Medium - July 30, 2020

A path traversal vulnerability exists in Pulse Connect Secure <9.1R8 that allowed an authenticated attacker via the administrator web interface to perform an arbitrary file reading vulnerability through Meeting.

Directory traversal

An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8

CVE-2020-15408 4.6 - Medium - July 28, 2020

An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.

AuthZ

An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8

CVE-2020-12880 5.5 - Medium - July 27, 2020

An issue was discovered in Pulse Policy Secure (PPS) and Pulse Connect Secure (PCS) Virtual Appliance before 9.1R8. By manipulating a certain kernel boot parameter, it can be tricked into dropping into a root shell in a pre-install phase where the entire source code of the appliance is available and can be retrieved. (The source code is otherwise inaccessible because the appliance has its hard disks encrypted, and no root shell is available during normal operation.)

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM)

CVE-2020-13162 7 - High - June 16, 2020

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions prior to 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

TOCTTOU

An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06

CVE-2020-11581 8.1 - High - April 06, 2020

An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, allows a man-in-the-middle attacker to perform OS command injection attacks (against a client) via shell metacharacters to the doCustomRemediateInstructions method, because Runtime.getRuntime().exec() is used.

Shell injection

An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06

CVE-2020-11582 8.8 - High - April 06, 2020

An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, launches a TCP server that accepts local connections on a random port. This can be reached by local HTTP clients, because up to 25 invalid lines are ignored, and because DNS rebinding can occur. (This server accepts, for example, a setcookie command that might be relevant to CVE-2020-11581 exploitation.)

Exposure of Resource to Wrong Sphere

A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12.

CVE-2018-20811 5.3 - Medium - June 28, 2019

A hidden RPC service issue was found with Pulse Secure Pulse Connect Secure 8.3RX before 8.3R2 and 8.1RX before 8.1R12.

Information Disclosure

A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5

CVE-2018-20809 7.5 - High - June 28, 2019

A crafted message can cause the web server to crash with Pulse Secure Pulse Connect Secure (PCS) 8.3RX before 8.3R5 and Pulse Policy Secure 5.4RX before 5.4R5. This is not applicable to PCS 8.1RX.

Improper Input Validation

An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization

CVE-2018-20808 6.1 - Medium - June 28, 2019

An XSS issue has been found with rd.cgi in Pulse Secure Pulse Connect Secure 8.3RX before 8.3R3 due to improper header sanitization. This is not applicable to 8.1RX.

XSS

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.