CVE-2018-20812 is a vulnerability in Pulse Secure Desktop Client
Published on June 28, 2019
An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
Products Associated with CVE-2018-20812
Want to know whenever a new CVE is published for Pulse Secure Desktop Client? stack.watch will email you.
Exploit Probability
EPSS
0.32%
Percentile
54.90%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.