CVE-2021-22908

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in Pulse Connect Secure's Windows File Resource Profiles allows authenticated users with SMB share browsing privileges to execute arbitrary code as root. This affects Pulse Connect Secure versions before 9.1R3, where the vulnerable permission is enabled by default.

💻 Affected Systems

Products:
  • Pulse Connect Secure
Versions: 9.X versions before 9.1R3
Operating Systems: Pulse Connect Secure appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable Windows File Resource Profile permission is enabled by default in affected versions. From 9.1R3 onward, this permission is disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote authenticated attacker gains root-level arbitrary code execution on the Pulse Connect Secure appliance, leading to complete system compromise, data exfiltration, and lateral movement.

🟠

Likely Case

Privileged internal user or compromised account exploits the vulnerability to gain root access on the VPN appliance, potentially accessing sensitive network resources.

🟢

If Mitigated

With proper access controls and patching, impact is limited to denial of service or minimal privilege escalation within the appliance.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with specific SMB share browsing privileges. No public exploit code was identified at the time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1R3 and later

Vendor Advisory: https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44800/

Restart Required: Yes

Instructions:

1. Download Pulse Connect Secure 9.1R3 or later from the Pulse Secure support portal. 2. Backup current configuration. 3. Apply the update via the admin web interface. 4. Reboot the appliance as required. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Windows File Resource Profile permission

all

Disable the vulnerable permission that allows browsing SMB shares

Navigate to Users > User Roles > Edit Role > Resource Policies > Disable 'Windows File Resource Profile' permission

Restrict user privileges

all

Limit user accounts to only necessary permissions, removing SMB share browsing where not required

Review and modify user role permissions in the admin interface

🧯 If You Can't Patch

  • Implement strict access controls and limit user privileges to only essential functions
  • Monitor for suspicious activity and implement network segmentation to isolate the appliance

🔍 How to Verify

Check if Vulnerable:

Check Pulse Connect Secure version via admin interface: System > Maintenance > Software Updates. If version is below 9.1R3, the system is vulnerable.

Check Version:

ssh admin@<appliance-ip> show version

Verify Fix Applied:

Verify version is 9.1R3 or higher and confirm Windows File Resource Profile permission is disabled in user roles.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMB share access attempts
  • Multiple failed authentication attempts followed by successful login
  • Unexpected process execution or privilege escalation events

Network Indicators:

  • Abnormal SMB traffic patterns to/from the Pulse Connect Secure appliance
  • Unexpected outbound connections from the appliance

SIEM Query:

source="pulse_secure" AND (event_type="authentication" AND result="success" AND user_privilege_change="elevated") OR (process_execution="unexpected" AND parent_process="pulse_secure")

🔗 References

📤 Share & Export