An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
References
Link | Resource |
---|---|
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ | Vendor Advisory |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877/ - Vendor Advisory |
Information
Published : 2019-06-28 18:15
Updated : 2024-11-21 04:02
NVD link : CVE-2018-20812
Mitre link : CVE-2018-20812
CVE.ORG link : CVE-2018-20812
JSON object : View
Products Affected
pulsesecure
- pulse_secure_desktop_client
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor