Unrated severityCISA KEVNVD Advisory· Published May 8, 2019· Updated Oct 21, 2025
CVE-2019-11510
CVE-2019-11510
Description
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
Affected products
1- Pulse Secure/Pulse Connect Securedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- www.kb.cert.org/vuls/id/927237mitrethird-party-advisoryx_refsource_CERT-VN
- packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.htmlmitrex_refsource_MISC
- www.securityfocus.com/bid/108073mitrevdb-entryx_refsource_BID
- badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/mitrex_refsource_MISC
- devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/mitrex_refsource_MISC
- i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdfmitrex_refsource_MISC
- kb.pulsesecure.netmitrex_refsource_MISC
- kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/mitrex_refsource_CONFIRM
- lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3Emitremailing-listx_refsource_MLIST
- psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010mitrex_refsource_CONFIRM
News mentions
1- The Convergence of Cloud Secrets & AI RiskSentinelOne Labs · May 13, 2026