CVE-2019-11539
HIGH
Published 2019-04-26T01:39:36.000Z
Actions:
CVSS Score
V3.0
8.0
/10
CVSS:3.0/AC:H/AV:N/A:H/C:H/I:H/PR:H/S:C/UI:N
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.964
probability
of exploitation in the wild
There is a 96.4% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.997
Higher than 99.7% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Known Exploited Vulnerability
This vulnerability is actively being exploited in the wild
Remediation Status
Overdue
Due Date
May 3, 2022
Added to KEV
November 3, 2021
Required Action
Apply updates per vendor instructions.
Affected Product
Vendor/Project:
Ivanti
Product:
Pulse Connect Secure and Pulse Policy Secure
Ransomware Risk
Known Ransomware Use
KEV Catalog Version: 2025.01.24
Released: January 24, 2025
References
HackerOne Reports
sp1d3rs
U.S. Dept Of Defense
$2000.00
Path Traversal
sp1d3rs
U.S. Dept Of Defense
$5000.00
File and Directory Information Exposure
sp1d3rs
U.S. Dept Of Defense
OS Command Injection
l00ph0le
U.S. Dept Of Defense
Command Injection - Generic
orange
X (Formerly Twitter)
$20160.00
OS Command Injection
Published: 2019-04-26T01:39:36.000Z
Last Modified: 2025-02-03T15:41:46.003Z
Copied to clipboard!