๐Ÿ” CVE Alert

CVE-2023-34298

HIGH 7.8

Pulse Secure Client SetupService Directory Traversal Local Privilege Escalation Vulnerability

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

Pulse Secure Client SetupService Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Pulse Secure Client. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within SetupService. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service. Was ZDI-CAN-17687.

CWE CWE-22
Vendor pulse secure
Product client
Published May 3, 2024
Last Updated Aug 2, 2024
Stay Ahead of the Next One

Get instant alerts for pulse secure client

Be the first to know when new high vulnerabilities affecting pulse secure client are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Versions

Pulse Secure / Client
9.1r15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
zerodayinitiative.com: https://www.zerodayinitiative.com/advisories/ZDI-23-858/ forums.ivanti.com: https://forums.ivanti.com/s/article/CVE-2023-34298-Ivanti-Secure-Access-Client-local-privilege-escalation?language=en_US