Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-44720


In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.


Published

2022-08-12T15:15:09.170

Last Modified

2024-11-21T06:31:27.577

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

Weaknesses
  • Type: Primary
    CWE-798

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application ivanti connect_secure 9.1 Yes
Application pulsesecure pulse_connect_secure < 9.1 Yes

References