CVE-2021-22893

CRITICAL KEV RANSOMWARE

Pulse Connect Secure >=9.0R3/9.1R1 - Auth Bypass

Title source: llm

Description

Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.

Exploits (12)

nomisec TROJAN 47 stars
by ZephrFish · poc
https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2
nomisec TROJAN 7 stars
by orangmuda · poc
https://github.com/orangmuda/CVE-2021-22893
nomisec STUB
by MRLEE123456 · client-side
https://github.com/MRLEE123456/CVE-2021-22893
inthewild TROJAN
poc
https://github.com/thomsdev/cve-2021-22893
inthewild TROJAN
poc
https://github.com/rakhanobe/cve-2021-22893
inthewild TROJAN
poc
https://github.com/oxctdev/cve-2021-22893
inthewild TROJAN
poc
https://github.com/onsecuredev/cve-2021-22893
inthewild TROJAN
poc
https://github.com/byteofjoshua/cve-2021-22893
inthewild TROJAN
poc
https://github.com/byteofandri/cve-2021-22893
inthewild TROJAN
poc
https://github.com/zephrfish/cve-2021-22893

Scores

CVSS v3 10.0
EPSS 0.9361
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-04-20
InTheWild.io 2021-04-28
ENISA EUVD EUVD-2021-10025
Ransomware Use Confirmed
CWE
CWE-287 CWE-416
Status published
Products (2)
ivanti/connect_secure 9.0 (13 CPE variants)
ivanti/connect_secure 9.1 (23 CPE variants)
Published Apr 23, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026