Pulse Secure is currently evaluating the following issues reported by OpenSSL:
As the investigation continues, we recommend subscribing to this advisory as it will be periodically updated to reflect the current status.
CVE-2021-3450 (CA certificate check bypass with X509_V_FLAG_X509_STRICT)
7.4 High CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Pulse Connect Secure | Not Vulnerable |
Pulse Policy Secure | Not Vulnerable |
Pulse One | Not Vulnerable |
CVE-2021-3449 (NULL pointer deref in signature_algorithms processing)
5.9 Medium CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Pulse Connect Secure | Not Vulnerable |
Pulse Policy Secure | Not Vulnerable |
Pulse One | Not Vulnerable |
LEGAL DISCLAIMER
⦁ THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE OF THIS INFORMATION FOUND IN THIS ADVISORY OR IN MATERIALS LINKED HEREFROM IS AT THE USER’S OWN RISK. PULSE SECURE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME.
⦁ A STANDALONE COPY OR PARAPHRASE OF THE TEXT OF THIS ADVISORY THAT OMITS THE DISTRIBUTION URL IS AN UNCONTROLLED COPY AND MAY OMIT IMPORTANT INFORMATION OR CONTAIN ERRORS. THE INFORMATION IN THIS ADVISORY IS INTENDED FOR END USERS OF PULSE SECURE PRODUCTS