A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 | Broken Link Vendor Advisory |
| http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 | Broken Link Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-8260 |
Configurations
Configuration 1 (hide)
|
History
22 Oct 2025, 00:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Feb 2025, 19:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ivanti
Ivanti connect Secure |
|
| CPE | cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r3:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r8:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r3.1:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r4.2:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r4:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r7:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r8.2:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:-:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r5:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r7.1:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:*:*:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r1:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r6:*:*:*:linux:*:* cpe:2.3:a:pulsesecure:pulse_secure_desktop_client:9.1:r2:*:*:*:linux:*:* |
cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r3.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r5.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r2.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r6.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r7.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:9.1:r8.4:*:*:*:*:*:* |
| References | () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 - Broken Link, Vendor Advisory |
21 Nov 2024, 05:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 - Vendor Advisory |
21 Sep 2021, 17:04
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-10-28 13:15
Updated : 2025-10-22 00:17
NVD link : CVE-2020-8260
Mitre link : CVE-2020-8260
CVE.ORG link : CVE-2020-8260
JSON object : View
Products Affected
ivanti
- connect_secure
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
