CVE-2020-11581
Ivanti Connect Secure vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2020-11581) was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The vulnerability exists in the applet within tncc.jar, which is executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced. This vulnerability allows a man-in-the-middle attacker to perform OS command injection attacks against a client via shell metacharacters to the doCustomRemediateInstructions method, due to the unsafe use of Runtime.getRuntime().exec() (NVD).

Technical details

The vulnerability stems from the Host Checker component's implementation in tncc.jar. When a client is found to be non-compliant with security policies, the system attempts to show remediation instructions using the doCustomRemediateInstructions method. This method uses Runtime.getRuntime().exec() without proper input sanitization, allowing command injection through shell metacharacters. The vulnerability received a CVSS v3.1 Base Score of 8.1 HIGH (Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD, Pulse Advisory).

Impact

The vulnerability allows attackers to execute arbitrary OS commands on affected client systems running macOS, Linux, or Solaris operating systems. This can lead to complete system compromise, including potential data theft, system manipulation, and further network penetration (Exploit Details).

Mitigation and workarounds

Organizations should update their Pulse Connect Secure installations to versions after 2020-04-06 to address this vulnerability. The fix was released through an official security advisory from Pulse Secure (Pulse Advisory).

Additional resources


SourceThis report was generated using AI

Related Ivanti Connect Secure vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55147HIGH8.8
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-55148HIGH7.6
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-8712MEDIUM5.4
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-8711MEDIUM5.4
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-55146MEDIUM4.9
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management