CVE-2019-11510

CRITICAL KEV RANSOMWARE NUCLEI

Pulse Secure PCS <9.0R3.4 - Info Disclosure

Title source: llm

Description

In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .

Exploits (15)

nomisec WORKING POC 364 stars
by projectzeroindia · remote
https://github.com/projectzeroindia/CVE-2019-11510
nomisec WORKING POC 135 stars
by BishopFox · remote
https://github.com/BishopFox/pwn-pulse
nomisec WORKING POC 53 stars
by jas502n · remote
https://github.com/jas502n/CVE-2019-11510-1
nomisec WORKING POC 50 stars
by imjdl · remote
https://github.com/imjdl/CVE-2019-11510-poc
nomisec SCANNER 28 stars
by cisagov · poc
https://github.com/cisagov/check-your-pulse
nomisec SCANNER 18 stars
by r00tpgp · infoleak
https://github.com/r00tpgp/http-pulse_ssl_vpn.nse
nomisec WORKING POC 9 stars
by aqhmal · remote
https://github.com/aqhmal/pulsexploit
nomisec WORKING POC 5 stars
by es0 · infoleak
https://github.com/es0/CVE-2019-11510_poc
nomisec SUSPICIOUS 3 stars
by 34zY · poc
https://github.com/34zY/APT-Backpack
nomisec WORKING POC 1 stars
by pwn3z · remote
https://github.com/pwn3z/CVE-2019-11510-PulseVPN
nomisec WORKING POC 1 stars
by andripwn · remote
https://github.com/andripwn/pulse-exploit
nomisec STUB
by jason3e7 · poc
https://github.com/jason3e7/CVE-2019-11510
nomisec SCANNER
by nuc13us · infoleak
https://github.com/nuc13us/Pulse
exploitdb WORKING POC
by Alyssa Herrera · rubywebappsmultiple
https://www.exploit-db.com/exploits/47297
metasploit WORKING POC
by Orange Tsai, Meh Chang, Alyssa Herrera, Justin Wagner, wvu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/pulse_secure_file_disclosure.rb

Nuclei Templates (1)

Pulse Connect Secure SSL VPN Arbitrary File Read
CRITICALby organiccrap
Shodan: http.html:"welcome.cgi?p=logo" || http.title:"ivanti connect secure"
FOFA: body="welcome.cgi?p=logo" || title="ivanti connect secure"

Scores

CVSS v3 10.0
EPSS 0.9446
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2021-11-03
VulnCheck KEV 2019-05-01
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2019-3183
Ransomware Use Confirmed

Classification

CWE
CWE-22
Status published

Affected Products (37)

ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
ivanti/connect_secure
... and 22 more

Timeline

Published May 08, 2019
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026