Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5 vulnerability allows attackers to bypass Windows authentication, gain system access, and execute commands. Learn how to mitigate this security risk.
Pulse Secure Client 9.0R1 and 5.3RX before 5.3R5, when configured to authenticate VPN users during Windows Logon, can allow attackers to bypass Windows authentication and execute commands on the system with the privileges of Pulse Secure Client.
Understanding CVE-2018-7572
When Pulse Secure Client 9.0R1 and 5.3RX prior to 5.3R5 are set up to authenticate VPN users during Windows Logon, attackers can evade Windows authentication and execute commands on the system using the client's privileges.
What is CVE-2018-7572?
This CVE describes a vulnerability in Pulse Secure Client that enables attackers to bypass Windows authentication and run commands on the system by disrupting the client's network connectivity and connecting to a malicious proxy server.
The Impact of CVE-2018-7572
Technical Details of CVE-2018-7572
Pulse Secure Client vulnerability details.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting against CVE-2018-7572.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates