CVE-2021-22965

7.5 HIGH

📋 TL;DR

An unauthenticated administrator can cause denial of service on Pulse Connect Secure devices by sending malformed requests. This affects Pulse Connect Secure versions before 9.1R12.1, potentially disrupting VPN connectivity for organizations using this product.

💻 Affected Systems

Products:
  • Pulse Connect Secure
Versions: All versions before 9.1R12.1
Operating Systems: Pulse Connect Secure OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of Pulse Connect Secure appliances.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Pulse Connect Secure VPN gateway, preventing all remote access and VPN connectivity for the organization.

🟠

Likely Case

Temporary service interruption requiring device restart, disrupting VPN access for remote users until service is restored.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response to DoS attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending malformed requests to the device's management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1R12.1 and later

Vendor Advisory: https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44879/?kA13Z000000L3ZF

Restart Required: Yes

Instructions:

1. Download Pulse Connect Secure 9.1R12.1 or later from Pulse Secure support portal. 2. Backup current configuration. 3. Apply the update through the web management interface. 4. Restart the appliance as prompted.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to Pulse Connect Secure management interface to trusted IP addresses only.

Configure firewall rules to restrict access to Pulse Connect Secure management IP/ports from authorized networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Pulse Connect Secure management interface
  • Monitor for unusual traffic patterns or repeated connection attempts to the management interface

🔍 How to Verify

Check if Vulnerable:

Check Pulse Connect Secure version in web management interface under System > Maintenance > Software Updates

Check Version:

No CLI command - check via web interface at System > Maintenance > Software Updates

Verify Fix Applied:

Verify version shows 9.1R12.1 or later after patching and confirm normal operation

📡 Detection & Monitoring

Log Indicators:

  • Multiple malformed HTTP requests to management interface
  • Unexpected service restarts or crashes

Network Indicators:

  • Unusual traffic patterns to Pulse Connect Secure management port (typically 443)
  • Repeated connection attempts from untrusted sources

SIEM Query:

source="pulse_secure" AND (event_type="service_restart" OR http_request contains "malformed")

🔗 References

📤 Share & Export