
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, accepts an arbitrary SSL certificate. The Host Checker is a client-side component that the Pulse Connect Secure appliance may require for VPN connection, performing basic checks on the client according to server policies (Git LSD).
The vulnerability stems from the Host Checker's implementation of a custom protocol for server communication. The client does not validate server certificates or hostnames, likely implemented to support misconfigured instances. This is evidenced in the HttpNAR class where trustAllCerts() and allowHostnameMismatch() functions are executed when initializing the connection to a server. The code implements a TrustManager that accepts all certificates without validation (Git LSD).
The vulnerability allows attackers in a position to perform a Man-in-the-Middle attack to spoof the server and potentially execute arbitrary commands on the client system. This is particularly concerning as the Host Checker is a required component for VPN connections in many deployments (Git LSD).
The vulnerability was addressed in subsequent versions of Pulse Connect Secure. Organizations should ensure they are running a patched version of the software. The fix likely includes proper certificate validation in the Host Checker component (Git LSD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."