4.6
CVSSv2

CVE-2020-8250

Published: 28/10/2020 Updated: 17/08/2021
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local malicious users to escalate privilege.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pulsesecure pulse secure desktop client

pulsesecure pulse secure desktop client 9.1

Github Repositories

CVE-2020-8250: Privilege Escalation via Command Injection in Pulse Secure VPN Linux Client

CVE-2020-8250: Privilege Escalation via Command Injection in Pulse Secure VPN Linux Client The root SUID executable pulsesvc, has a function “do_upload” that unsafely passes the “HOME” environmental variable to “system()” By altering the “HOME” variable to contain special shell characters (Ex: “``” or “$()&rdquo