CVE-2021-22934

7.2 HIGH

📋 TL;DR

This vulnerability allows an authenticated administrator or compromised Pulse Connect Secure device in a load-balanced configuration to perform a buffer overflow via malicious web requests. It affects Pulse Connect Secure versions before 9.1R12, potentially leading to arbitrary code execution or system compromise.

💻 Affected Systems

Products:
  • Pulse Connect Secure
Versions: All versions before 9.1R12
Operating Systems: Pulse Connect Secure appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects load-balanced configurations where one device could be compromised to attack others.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary code with administrative privileges, potentially pivoting to other network resources.

🟠

Likely Case

Denial of service or limited code execution within the Pulse Connect Secure appliance context.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized administrative access.

🌐 Internet-Facing: MEDIUM - Requires authenticated administrator access or compromised device in load-balanced config, but Pulse Connect Secure is often internet-facing.
🏢 Internal Only: MEDIUM - Internal administrators could exploit, but requires specific load-balanced configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated administrator access or already compromised device in load-balanced setup.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1R12 and later

Vendor Advisory: https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44858/?kA23Z000000L6oySAC

Restart Required: Yes

Instructions:

1. Download Pulse Connect Secure 9.1R12 or later from Pulse Secure support portal. 2. Backup current configuration. 3. Apply update via admin interface. 4. Restart appliance. 5. Verify version and functionality.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit administrative access to Pulse Connect Secure to trusted IP addresses and users only.

Review load balancing configuration

all

Audit and secure load-balanced Pulse Connect Secure configurations to prevent device-to-device attacks.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Pulse Connect Secure appliances
  • Enforce multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check Pulse Connect Secure version via admin interface: System > Maintenance > Software Updates. If version is below 9.1R12, system is vulnerable.

Check Version:

No CLI command - check via web admin interface at System > Maintenance > Software Updates

Verify Fix Applied:

After patching, verify version shows 9.1R12 or higher in admin interface and test administrative functions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Multiple failed buffer overflow attempts in web logs
  • Abnormal process creation

Network Indicators:

  • Unusual administrative traffic patterns to Pulse Connect Secure
  • Suspicious requests to administrative endpoints

SIEM Query:

source="pulse_secure" AND (event_type="buffer_overflow" OR event_type="admin_abuse")

🔗 References

📤 Share & Export