Executive Summary

Summary
Title Pulse Secure Linux client GUI fails to validate SSL certificates
Informations
Name VU#319904 First vendor Publication 2018-02-01
Vendor VU-CERT Last vendor Modification 2018-02-01
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P)
Cvss Base Score 6.4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#319904

Pulse Secure Linux client GUI fails to validate SSL certificates

Original Release date: 01 Feb 2018 | Last revised: 01 Feb 2018

Overview

The Pulse Secure Linux client GUI fails to validate SSL certificates, which can allow an attacker to modify connection settings.

Description

Pulse Secure is an SSL VPN solution. The Linux Pulse Secure client GUI is implemented using WebKit, and the actions taken using the GUI are implemented by overriding JavaScript functions. The WebKit component of the Linux Pulse Secure client GUI is configured to ignore SSL validation errors. This means that when the Pulse Secure Linux client GUI is used to connect to a VPN server on an untrusted network, an attacker may be able to take actions that occur as the result of a user interacting with the Pulse Secure GUI. For example, an attacker may be able to modify or create new VPN connections in the Pulse Secure GUI. An attacker can also modify the welcome message that the Pulse Secure client GUI displays to the user when a VPN connection is established as well.

Impact

By modifying traffic between a Pulse Secure Linux client GUI and a server, an attacker may be able to take actions in the Pulse Secure client GUI, as well as modify information presented to the user. This may result in the user connecting to a malicious VPN server.

Solution

Apply an update

This issue is addressed in Pulse Secure versions PULSE5.3R4.2 Software (Build 639) and PULSE5.2R9.2 Software (Build 638). Please see Pulse Secure advisory SA43620 - 2018-01 for more details. If you are unable to apply an update, please consider the following workaround:

Use the Pulse Secure Linux client CLI

By avoiding the use of the Pulse Secure Linux client GUI, the vulnerable code that does not validate certificates can be avoided.

Do not use the Pulse Secure Linux client GUI on untrusted networks

By not using the Pulse Secure Linux client GUI on an untrusted network, the risk of exploitation of this vulnerability can be minimized.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Pulse SecureAffected11 Dec 201701 Feb 2018
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base5.1AV:N/AC:H/Au:N/C:P/I:P/A:P
Temporal4.0E:POC/RL:OF/RC:C
Environmental3.0CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43620

Credit

This vulnerability was reported by Will Dormann of the CERT/CC.

This document was written by Will Dormann.

Other Information

  • CVE IDs:CVE-2018-6374
  • Date Public:01 Feb 2018
  • Date First Published:01 Feb 2018
  • Date Last Updated:01 Feb 2018
  • Document Revision:6

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/319904

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-295 Certificate Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2018-02-25 05:20:40
  • Multiple Updates
2018-02-02 00:19:35
  • First insertion