CVE-2019-11510 Report Request
This arbitrary file reading vulnerability allows sensitive information disclosure enabling unauthenticated attackers to access private keys and user passwords. Further exploitation using the leaked credentials can lead to remote command injection (CVE-2019-11539) and allow attackers to gain access inside private VPN networks.

Bad Packets® CVE-2019-11510 summary report is available here:
https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/

The list of vulnerable Pulse Secure VPN servers is freely available for authorized government CERT, CSIRT, ISAC, and law enforcement teams to review. To obtain a report of vulnerable hosts impacting your constituency, please fill out the form below.

PLEASE NOTE
This form is not for commercial requests. If you need a commercial license for our vulnerability data, please submit request here: https://forms.gle/DBRKgZGJqukVBzTb9
Email *
Name *
Organization *
Organization Type *
Please provide the country, autonomous system number (ASN), IP netblocks (BGP prefix in CIDR format), or domain names of your constituency: *
This report request is for non-commercial use only and may not be modified, copied, republished, displayed, posted, or sold in any form or by any means, in whole or in part, without prior written permission from Bad Packets LLC.
Submit
Never submit passwords through Google Forms.
This form was created inside of Bad Packets LLC. Report Abuse