CVE-2018-20812

An information exposure issue where IPv6 DNS traffic would be sent outside of the VPN tunnel (when Traffic Enforcement was enabled) exists in Pulse Secure Pulse Secure Desktop 9.0R1 and below. This is applicable only to dual-stack (IPv4/IPv6) endpoints.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
pulsesecurepulse_secure_desktop_client
4.0:r1.0
pulsesecurepulse_secure_desktop_client
4.0:r10.0
pulsesecurepulse_secure_desktop_client
4.0:r11.0
pulsesecurepulse_secure_desktop_client
4.0:r11.1
pulsesecurepulse_secure_desktop_client
4.0:r12.0
pulsesecurepulse_secure_desktop_client
4.0:r13.0
pulsesecurepulse_secure_desktop_client
4.0:r2.0
pulsesecurepulse_secure_desktop_client
4.0:r3.0
pulsesecurepulse_secure_desktop_client
4.0:r4.0
pulsesecurepulse_secure_desktop_client
4.0:r5.0
pulsesecurepulse_secure_desktop_client
4.0:r6.0
pulsesecurepulse_secure_desktop_client
4.0:r7.0
pulsesecurepulse_secure_desktop_client
4.0:r8.0
pulsesecurepulse_secure_desktop_client
4.0:r9.0
pulsesecurepulse_secure_desktop_client
4.0:r9.1
pulsesecurepulse_secure_desktop_client
4.0:r9.2
pulsesecurepulse_secure_desktop_client
5.1:r1.0
pulsesecurepulse_secure_desktop_client
5.1:r1.1
pulsesecurepulse_secure_desktop_client
5.1:r10.0
pulsesecurepulse_secure_desktop_client
5.1:r11.0
pulsesecurepulse_secure_desktop_client
5.1:r11.1
pulsesecurepulse_secure_desktop_client
5.1:r12.0
pulsesecurepulse_secure_desktop_client
5.1:r13.0
pulsesecurepulse_secure_desktop_client
5.1:r14.0
pulsesecurepulse_secure_desktop_client
5.1:r2.0
pulsesecurepulse_secure_desktop_client
5.1:r3.0
pulsesecurepulse_secure_desktop_client
5.1:r3.1
pulsesecurepulse_secure_desktop_client
5.1:r4.0
pulsesecurepulse_secure_desktop_client
5.1:r5.1
pulsesecurepulse_secure_desktop_client
5.1:r6.0
pulsesecurepulse_secure_desktop_client
5.1:r7.0
pulsesecurepulse_secure_desktop_client
5.1:r8.0
pulsesecurepulse_secure_desktop_client
5.1:r9.0
pulsesecurepulse_secure_desktop_client
5.1:r9.1
pulsesecurepulse_secure_desktop_client
5.1r:r
pulsesecurepulse_secure_desktop_client
5.1r:r
pulsesecurepulse_secure_desktop_client
5.3:r1
pulsesecurepulse_secure_desktop_client
5.3:r1.1
pulsesecurepulse_secure_desktop_client
5.3:r2
pulsesecurepulse_secure_desktop_client
5.3:r3
pulsesecurepulse_secure_desktop_client
5.3:r4
pulsesecurepulse_secure_desktop_client
5.3:r4.1
pulsesecurepulse_secure_desktop_client
5.3:r4.2
pulsesecurepulse_secure_desktop_client
5.3:r5
pulsesecurepulse_secure_desktop_client
5.3:r5.2
pulsesecurepulse_secure_desktop_client
5.3:r6
pulsesecurepulse_secure_desktop_client
5.3:r7
pulsesecurepulse_secure_desktop_client
9.0:r1
pulsesecurepulse_secure_desktop_client
9.0:r2
pulsesecurepulse_secure_desktop_client
9.0:r2.1
pulsesecurepulse_secure_desktop_client
9.0:r3
pulsesecurepulse_secure_desktop_client
9.0:r3.2
pulsesecurepulse_secure_desktop_client
9.0:r4
𝑥
= Vulnerable software versions