⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..

CVE-2020-8243Code Injection in Ivanti Connect Secure

CWE-94Code Injection16 documents10 sources
Severity
7.2HIGHNVD
EPSS
13.2%
top 5.84%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 30
KEV addedNov 3
KEV dueMay 3
Latest updateJan 8
CISA Required Action: Apply updates per vendor instructions.

Description

A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
GHSA-87wj-wph2-98g5: A vulnerability in the Pulse Connect Secure < 92022-05-24
CVEList
CVE-2020-8243: A vulnerability in the Pulse Connect Secure < 92020-09-29
VulnCheck
Ivanti Pulse Connect Secure Code Execution Vulnerability2020

📋Vendor Advisories

2
Ivanti
Ivanti Pulse Connect Secure Code Execution Vulnerability2021-11-03
CISA
Ivanti Pulse Connect Secure Code Execution Vulnerability2021-11-03

🕵️Threat Intelligence

10
Tenable
CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild2025-01-08
Tenable
CVE-2023-46805, CVE-2024-21887: Zero-Day Vulnerabilities Exploited in Ivanti Connect Secure and Policy Secure Gateways2024-01-10
Qualys
Managing CISA Known Exploited Vulnerabilities with Qualys VMDR | Qualys2022-02-23
Qualys
Qualys Response to CISA Alert: Binding Operational Directive 22-012021-11-09
Qualys
Qualys Response to CISA Alert: Binding Operational Directive 22-01 | Qualys2021-11-09
CVE-2020-8243 — Code Injection in Ivanti Connect Secure | cvebase