CVE-2019-11539
HIGH KEV RANSOMWAREPulse Secure <9.0R3.4-5.1R15.1 - Authenticated Command Injection
Title source: llmDescription
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 and Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1, the admin web interface allows an authenticated attacker to inject and execute commands.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/47700
exploitdb
WORKING POC
by Justin Wagner · pythonremotemultiple
https://www.exploit-db.com/exploits/47354
metasploit
WORKING POC
EXCELLENT
by Orange Tsai, Meh Chang, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pulse_secure_cmd_exec.rb
References (10)
Scores
CVSS v3
7.2
EPSS
0.9390
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2019-10-02
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2019-3210
Ransomware Use
Confirmed
CWE
CWE-78
Status
published
Products (3)
ivanti/connect_secure
8.1 (25 CPE variants)
ivanti/connect_secure
8.2 (22 CPE variants)
ivanti/connect_secure
8.3 (3 CPE variants)
Published
Apr 26, 2019
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026