Previously Compromised PulseSSL VPN Hosts
Critical
Vulnerability Details
Hi again!!
Back in 2019, I had reported that a pulseSSL VPN server owned by US DoD can be compromised by a publicly available exploit. The report is #681249. As a result, the userid and passwd db was also compromised. I found that at least 1 userid and password combination from that compromised db can still be used.
##PoC
Here is a screenshot of me accessing a US DoD owned website using a compromised credentials found back in 2019. I am still able to login to https://████/dana-na/auth/url_46/welcome.cgi with:
l: ███
p: █████████
███████
███████
Here is the creds from Sep, 2019.
█████
## Impact
It is widely reported in the media that blackhat hackers around the world are still hacking fully patched PulseSSL VPN hosts because owners did not change the passwords that was compromised back in 2019. The articles that I am referring to is at :
https://www.us-cert.gov/ncas/alerts/aa20-107a
https://thehackernews.com/2020/04/pulse-secure-vpn-vulnerability.html
##Fix
Other than patching, it is strongly advisable that the impacted organization `███` __reset all passwords immediately__.
Actions
View on HackerOneReport Stats
- Report ID: 852713
- State: Closed
- Substate: resolved
- Upvotes: 13