Lucene search

K
thnThe Hacker NewsTHN:FA7EFA3A74BF3490AD84EA169EA6C4CA
HistoryMay 25, 2021 - 7:37 a.m.

New High-Severity Vulnerability Reported in Pulse Connect Secure VPN

2021-05-2507:37:00
The Hacker News
thehackernews.com
478

0.961 High

EPSS

Percentile

99.5%

Pulse Connect Secure

Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an authenticated remote attacker to execute arbitrary code with elevated privileges.

β€œBuffer Overflow in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user,” the company said in an alert published on May 14. β€œAs of version 9.1R3, this permission is not enabled by default.”

The flaw, identified as CVE-2021-22908, has a CVSS score of 8.5 out of a maximum of 10 and impacts Pulse Connect Secure versions 9.0Rx and 9.1Rx. In a report detailing the vulnerability, the CERT Coordination Center said the issue stems from the gateway’s ability to connect to Windows file shares through a number of CGI endpoints that could be leveraged to carry out the attack.

β€œWhen specifying a long server name for some SMB operations, the β€˜smbclt’ application may crash due to either a stack buffer overflow or a heap buffer overflow, depending on how long of a server name is specified,” CERT/CC detailed in a vulnerability note published on Monday, adding it was able to trigger the vulnerable code by targeting the CGI script β€˜/dana/fb/smb/wnf.cgi.’

Pulse Secure customers are recommended to upgrade to PCS Server version 9.1R.11.5 when it becomes available. In the interim, Ivanti has published a workaround file (β€˜Workaround-2105.xml’) that can be imported to disable the Windows File Share Browser feature by adding the vulnerable URL endpoints to a blocklist and thus activate necessary mitigations to protect against this vulnerability.

It bears noting that users running PCS versions 9.1R11.3 or below would need to import a different file named β€˜Workaround-2104.xml,’ necessitating that the PCS system is running 9.1R11.4 before applying the safeguards in β€˜Workaround-2105.xml.’

Pulse Connect Secure

While Ivanti has recommended turning off Windows File Browser on the Admin UI by disabling the option β€˜Files, Window [sic]’ for specific user roles, CERT/CC found the steps were inadequate to protect against the flaw during its testing.

β€œThe vulnerable CGI endpoints are still reachable in ways that will trigger the β€˜smbclt’ application to crash, regardless of whether the β€˜Files, Windows’ user role is enabled or not,” it noted.

β€œAn attacker would need a valid DSID and β€˜xsauth’ value from an authenticated user to successfully reach the vulnerable code on a PCS server that has an open Windows File Access policy.”

The disclosure of a new flaw arrives weeks after the Utah-based IT software company patched multiple critical security vulnerabilities in Pulse Connect Secure products, including CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900, the first of which was found to be actively exploited in the wild by at least two different threat actors.

Found this article interesting? Follow THN on Facebook, Twitter ο‚™ and LinkedIn to read more exclusive content we post.