Learn about CVE-2021-44720, a vulnerability in Ivanti Pulse Secure Pulse Connect Secure (PCS) allowing unauthorized escalation of administrative roles. Find mitigation steps and preventive measures here.
In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.
Understanding CVE-2021-44720
This CVE highlights a vulnerability in Ivanti Pulse Secure Pulse Connect Secure (PCS) that exposes the administrator password in the HTML source code.
What is CVE-2021-44720?
The vulnerability in Ivanti Pulse Secure Pulse Connect Secure (PCS) allows a read-only administrative user to gain escalated privileges to a read-write administrative role by accessing the stored administrator password.
The Impact of CVE-2021-44720
The security issue poses a significant threat as unauthorized users can exploit it to gain control of the system and perform unauthorized actions.
Technical Details of CVE-2021-44720
Ivanti Pulse Secure Pulse Connect Secure (PCS) vulnerability details.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protective measures to mitigate CVE-2021-44720.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates