An issue was discovered with the Pulse Connect Secure device that could allow an attacker to print out contents from files from a limited and specific directory on the device. When exploited, the files that are accessible (read-only) are related to an authentication, and are system related, but they do not contain configuration or private user data.
This issue takes place on a resource that does not require user authentication.
A byproduct of this issue is that when exploited it will create temporary files that are not cleaned up. If the exploit was run enough times it could eventually fill up the file system where the files exist.
This issue was assigned: CVE-2016-4787
This issue was responsibly reported to Pulse Secure by a security researcher.
Pulse Secure is not aware of any public exploitation of this issue.