Pulse Secure Secure Access Series Ssl Vpn Sa 4000
By the Year
In 2024 there have been 0 vulnerabilities in Pulse Secure Secure Access Series Ssl Vpn Sa 4000 . Secure Access Series Ssl Vpn Sa 4000 did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 1 | 8.80 |
It may take a day or so for new Secure Access Series Ssl Vpn Sa 4000 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Pulse Secure Secure Access Series Ssl Vpn Sa 4000 Security Vulnerabilities
Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC)
CVE-2018-20193
8.8 - High
- December 21, 2018
Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed. Specifically, it is possible for a readonly user to change the administrator user password by making a local copy of the /dana-admin/user/update.cgi page, changing the "user" value, and saving the changes.
Improper Privilege Management
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Pulse Secure Secure Access Series Ssl Vpn Sa 4000 or by Pulse Secure? Click the Watch button to subscribe.