⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-05-03.
CVE-2019-11510 — Path Traversal in Ivanti Connect Secure
CWE-22 — Path TraversalCWE-404 — Improper Resource Shutdown or ReleaseCWE-74 — Injection130 documents26 sources
Severity
10.0CRITICALNVD
VulnCheck9.8VulnCheck7.8
EPSS
94.5%
top < 0.01%
CISA KEV
KEVRansomware
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 8
KEV addedNov 3
KEV dueMay 3
Latest updateJun 27
CISA Required Action: Apply updates per vendor instructions.
Description
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages1 packages
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
3🔍Detection Rules
1📋Vendor Advisories
2🕵️Threat Intelligence
107Bleepingcomputer
▶
Tenable▶
CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild↗2025-01-14
Tenable
▶
📄Research Papers
3💬Community
7HackerOne▶
Arbitrary File Reading leads to RCE in the Pulse Secure SSL VPN on the https://██████ (███)↗2024-06-18
HackerOne
▶
HackerOne
▶
HackerOne
▶