![]() ![]() ![]() Note: Only versions that have not gone past the end-of-engineering milestones are reviewed and mentioned in the above list. ![]() Odyssey Access (Windows) Client - 5.6R16 and prior versions.Note: Impacted only if the client is installed using administrator privileges Pulse Secure Collaboration (Windows) client (formerly known as Secure Meeting) versions:.7.4R1 to 7.4R13.6 (currently only supported on SA700 model).8.0R1 to 8.0R15 (currently only supported on SA6000-FIPS and SA4000-FIPS models).Standalone Pulse Installer Service (Windows) client (formerly known as Juniper Installer Service) versions:.5.0R1 to 5.0R15 (currently only supported on SA6000-FIPS and SA4000-FIPS models).Pulse Secure Desktop (Windows) Client versions:.The following products and versions are the only clients that are known to be vulnerable by this issue: Pulse Secure PSIRT is not aware of any malicious exploitation of this vulnerability. This is a client-side exploit only and does not affect the PCS or PPS gateway (server) device. A security vulnerability was discovered within a Pulse Secure client-side component (Windows OS only). By exploiting this vulnerability, a restricted user on a endpoint machine can obtain administrative privilege. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |