Pulse Secure Critical Zero-Day Security Bug Under Active Exp

Pulse Secure Critical Zero-Day Security Bug Under Active Exploit


minute read
Share this article:
CVE-2021-22893 allows remote code-execution (RCE) and is being used in the wild by nation-state cyberattackers to compromise VPN appliances in defense, finance and government orgs.
A critical zero-day security vulnerability in Pulse Secure VPN devices has been exploited by nation-state actors to launch cyberattacks against U.S. defense, finance and government targets, as well as victims in Europe, researchers said.
Download “The Evolution of Ransomware” to gain valuable insights on emerging trends amidst rapidly growing attack volumes. Click above to hone your defense intelligence!
The flaw, tracked as CVE-2021-22893, allows remote code-execution (RCE) and is being used in the wild to gain administrator-level access to the appliances, according to Ivanti research. Pulse Secure said that the zero-day will be patched in early May; but in the meantime, the company worked with Ivanti (its parent company) to release both mitigations and the Pulse Connect Secure Integrity Tool, to help determine if systems have been impacted.

Related Keywords

China , Russia , Chinese , Bharat Jogi , Department Of Homeland Security , Microsoft Office , Infrastructure Security Agency , Pulse Secure , Pulse Connect Secure Integrity Tool , Security Advisory , Pulse Connect Secure , Windows File Share Browser , Pulse Secure Collaboration , Favorite Target , Cozy Bear , Homeland Security , Active Directory , Vulcan Cyber , Hacks , Malware , Vulnerabilities , Eb Security , Mobile Security , Privacy , சீனா , ரஷ்யா , சீன , துறை ஆஃப் தாயகம் பாதுகாப்பு , மைக்ரோசாஃப்ட் அலுவலகம் , துடிப்பு பாதுகாப்பானது , துடிப்பு இணைக்கவும் பாதுகாப்பானது , வசதியான தாங்க , தாயகம் பாதுகாப்பு , செயலில் அடைவு , வல்கன் சைபர் , ஹேக்ஸ் ,

© 2025 Vimarsana