CVE-2021-22900

7.2 HIGH

📋 TL;DR

This vulnerability in Pulse Connect Secure allows authenticated administrators to upload malicious archives that can write arbitrary files to the system. It affects Pulse Connect Secure versions before 9.1R11.4. Attackers with admin credentials could exploit this to potentially execute code or modify system files.

💻 Affected Systems

Products:
  • Pulse Connect Secure
Versions: All versions before 9.1R11.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication to exploit. Affects the web administration interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised admin credentials could upload malicious archives to write arbitrary files, potentially leading to remote code execution, system compromise, or data exfiltration.

🟠

Likely Case

Authenticated attackers could write files to the system, potentially enabling persistence mechanisms, configuration changes, or privilege escalation.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to file writes within the application's context, though this could still enable further exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. CISA has confirmed active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1R11.4 and later

Vendor Advisory: https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY

Restart Required: Yes

Instructions:

1. Download Pulse Connect Secure 9.1R11.4 or later from the Pulse Secure support portal. 2. Backup current configuration. 3. Apply the update following vendor documentation. 4. Restart the service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to only trusted IP addresses and require multi-factor authentication.

Monitor File Uploads

all

Implement monitoring for archive uploads in the admin interface and alert on suspicious activity.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Pulse Connect Secure from critical systems
  • Enforce strong authentication and monitoring for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check the Pulse Connect Secure version via the admin web interface or CLI. If version is below 9.1R11.4, the system is vulnerable.

Check Version:

From CLI: show version or via web interface: System > Maintenance > Software Updates

Verify Fix Applied:

Verify the version is 9.1R11.4 or higher and check that the patch was applied successfully via the system logs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual archive file uploads in admin logs
  • Multiple failed upload attempts
  • Suspicious admin login patterns

Network Indicators:

  • Unusual traffic to admin interface from unexpected sources
  • Large file uploads to admin endpoints

SIEM Query:

source="pulse_secure" AND (event="file_upload" OR event="archive_upload") AND user_role="admin"

🔗 References

📤 Share & Export