CVE-2021-22893
Summary
| CVE | CVE-2021-22893 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-04-23 17:15:00 UTC |
| Updated | 2024-01-13 18:36:00 UTC |
| Description | Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild. |
Risk And Classification
EPSS: 0.936070000 probability, percentile 0.998350000 (date 2026-04-01)
CISA KEV: Listed on 2021-11-03; due 2022-05-03; ransomware use Known
Problem Types: CWE-416
CISA Known Exploited Vulnerability
| Vendor | Ivanti |
|---|---|
| Product | Pulse Connect Secure |
| Name | Ivanti Pulse Connect Secure Use-After-Free Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22893 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ivanti | Connect Secure | 9.0 | - | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r1 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r2 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r2.1 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r3 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r3.1 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r3.2 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r3.3 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r3.5 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r4 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r4.1 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r5.0 | All | All |
| Application | Ivanti | Connect Secure | 9.0 | r6.0 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | All | All | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | - | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r2 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r2.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r3 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r3.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r3.2 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r3.3 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r3.5 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r4 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r4.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r5.0 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.0 | r6.0 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | - | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r10.0 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r10.2 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r11.0 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r11.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r11.3 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r2 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r3 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r4 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r4.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r4.2 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r4.3 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r5 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r6 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r7 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r8 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r8.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r8.2 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r8.4 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r9 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r9.1 | All | All |
| Application | Pulsesecure | Pulse Connect Secure | 9.1 | r9.2 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day | FireEye Inc | MISC | www.fireeye.com | |
| VU#213092 - Pulse Connect Secure vulnerable to authentication bypass that could allow for remote code execution | MISC | kb.cert.org | |
| Pulse Connect Secure Security Update - Pulse Secure Blog | MISC | blog.pulsesecure.net | |
| Public KB - SA44784 - 2021-04: Out-of-Cycle Advisory: Pulse Connect Secure RCE Vulnerability (CVE-2021-22893) | MISC | kb.pulsesecure.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 38838 Pulse Connect Secure Remote Code Execution Vulnerability (SA44784)