CVE-2019-11510

CRITICAL
2019-05-08 [email protected]
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:19 vuln.today
Patch Released
Dec 18, 2025 - 02:00 nvd
Patch available
PoC Detected
Dec 18, 2025 - 02:00 vuln.today
Public exploit code
Added to CISA KEV
Dec 18, 2025 - 02:00 cisa
CISA KEV
CVE Published
May 08, 2019 - 17:29 nvd
CRITICAL 10.0

Description

In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .

Analysis

Pulse Secure Pulse Connect Secure contains a pre-authentication arbitrary file reading vulnerability that allows unauthenticated remote attackers to read any file from the VPN appliance, including cached credentials and session tokens.

Technical Context

The CWE-22 path traversal vulnerability allows unauthenticated requests to read arbitrary files by sending a crafted URI to the VPN web interface. Critical files exposed include /etc/passwd, /etc/shadow (encrypted), and most importantly the session database containing cached AD credentials in plaintext and active VPN session cookies.

Affected Products

['Pulse Secure Pulse Connect Secure 8.2 before 8.2R12.1', 'Pulse Secure PCS 8.3 before 8.3R7.1', 'Pulse Secure PCS 9.0 before 9.0R3.4']

Remediation

Patch immediately. After patching, rotate ALL Active Directory credentials that were cached on the VPN appliance. Revoke all active VPN sessions. Enable MFA for VPN access. Review authentication logs for unauthorized access using stolen credentials.

Priority Score

224
Low Medium High Critical
KEV: +50
EPSS: +94.4
CVSS: +50
POC: +20

Share

CVE-2019-11510 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy