An improper authentication vulnerability exists in Pulse Connect Secure <9.1RB that allows an attacker with a users primary credentials to bypass the Google TOTP.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Connect_secure | Ivanti | 9.1 (including) | 9.1 (including) |
Connect_secure | Ivanti | 9.1-r1 (including) | 9.1-r1 (including) |
Connect_secure | Ivanti | 9.1-r2 (including) | 9.1-r2 (including) |
Connect_secure | Ivanti | 9.1-r3 (including) | 9.1-r3 (including) |
Connect_secure | Ivanti | 9.1-r4 (including) | 9.1-r4 (including) |
Connect_secure | Ivanti | 9.1-r4.1 (including) | 9.1-r4.1 (including) |
Connect_secure | Ivanti | 9.1-r4.2 (including) | 9.1-r4.2 (including) |
Connect_secure | Ivanti | 9.1-r4.3 (including) | 9.1-r4.3 (including) |
Connect_secure | Ivanti | 9.1-r5 (including) | 9.1-r5 (including) |
Connect_secure | Ivanti | 9.1-r6 (including) | 9.1-r6 (including) |
Connect_secure | Ivanti | 9.1-r7 (including) | 9.1-r7 (including) |
Pulse_connect_secure | Pulsesecure | * | 9.0 (including) |