7
CVSSv3

CVE-2020-13162

Published: 16/06/2020 Updated: 01/03/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A time-of-check time-of-use vulnerability in PulseSecureService.exe in Pulse Secure Client versions before 9.1.6 down to 5.3 R70 for Windows (which runs as NT AUTHORITY/SYSTEM) allows unprivileged users to run a Microsoft Installer executable with elevated privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pulsesecure pulse secure desktop client 9.1

pulsesecure pulse secure desktop client 9.0

pulsesecure pulse secure desktop client 5.3

pulsesecure pulse secure installer service 8.3

pulsesecure pulse secure installer service 9.1

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Pulse Secure Windows Client &lt;916 (CVE-2020-13162) - exploit <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...

Github Repositories

Exploit for CVE-2020-13162

Pulse Secure Windows Client &lt;916 (CVE-2020-13162) - exploit RedTimmy Security 2020 (c) - Twitter: twittercom/redtimmysec Compile as 32-bit binary if you don't want to die! Compiled with Visual Studio 2015 - Community Edition After compiling copy the generated binary into the same folder with "evilmsi" and the Pulse Secure signed binary "