Vulnerability Details : CVE-2020-8219
An insufficient permission check vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to change the password of a full administrator.
Products affected by CVE-2020-8219
- cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*
- cpe:2.3:a:pulsesecure:pulse_policy_secure:*:*:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*
- cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*
- cpe:2.3:a:ivanti:policy_secure:9.1:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-8219
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-8219
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2020-8219
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by: nvd@nist.gov (Primary)
-
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.Assigned by: support@hackerone.com (Secondary)
References for CVE-2020-8219
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
Pulse Security Advisory: SA44516 - 2020-07: Security Bulletin: Multiple Vulnerabilities Resolved in Pulse Connect Secure / Pulse Policy Secure 9.1R8Vendor Advisory
Jump to