CVE-2021-22937
Ivanti Connect Secure vulnerability analysis and mitigation

Overview

CVE-2021-22937 is a critical vulnerability discovered in Pulse Connect Secure VPN appliances before version 9.1R12. The vulnerability allows an authenticated administrator to perform a file write via a maliciously crafted archive uploaded in the administrator web interface. This flaw was identified as a patch bypass for the previously discovered CVE-2020-8260, which was patched in October 2020 (Tenable Blog, SecurityWeek).

Technical details

The vulnerability is an uncontrolled archive extraction flaw that received a CVSS v3.1 base score of 9.1. The issue stems from improper validation of archive files in the administrator web interface. While the original patch for CVE-2020-8260 added validation to ensure archives only contain 'expected files', this validation did not apply to all archive types, specifically the 'profiler' type, leaving a security gap. The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type) (NVD, Tenable Blog).

Impact

Successful exploitation of this vulnerability results in Remote Code Execution (RCE) on the underlying Operating System with root privileges. An attacker with such access can circumvent web application restrictions, remount the filesystem, create persistent backdoors, extract and decrypt credentials, compromise VPN clients, or pivot into the internal network (Tenable Blog, Help Net Security).

Mitigation and workarounds

Ivanti released Pulse Connect Secure version 9.1R12 to address this vulnerability. The update not only patches CVE-2021-22937 but also includes enhanced features such as the incorporation of the Pulse Security Integrity Checker Tool directly into the product. Organizations are strongly advised to upgrade their installations to this version as soon as possible (Help Net Security).

Additional resources


SourceThis report was generated using AI

Related Ivanti Connect Secure vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55147HIGH8.8
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-55148HIGH7.6
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-8712MEDIUM5.4
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:policy_secure
NoYesSep 09, 2025
CVE-2025-8711MEDIUM5.4
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:connect_secure
NoYesSep 09, 2025
CVE-2025-55146MEDIUM4.9
  • Ivanti Connect SecureIvanti Connect Secure
  • cpe:2.3:a:ivanti:policy_secure
NoYesSep 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management