PatchSiren

PatchSiren cyber security CVE debrief

CVE-2019-11539 Ivanti CVE debrief

CVE-2019-11539 is a command injection vulnerability affecting Ivanti Pulse Connect Secure and Pulse Policy Secure. In the supplied CISA KEV entry, it is marked as known exploited and noted for known ransomware campaign use, making it a high-priority issue for any organization still running affected deployments.

Vendor
Ivanti
Product
Pulse Connect Secure and Pulse Policy Secure
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2021-11-03
Original CVE updated
2021-11-03
Advisory published
2021-11-03
Advisory updated
2021-11-03

Who should care

Administrators and security teams responsible for Ivanti Pulse Connect Secure and Pulse Policy Secure, especially vulnerability management and incident response teams tracking CISA Known Exploited Vulnerabilities.

Technical summary

The supplied sources identify CVE-2019-11539 as a command injection vulnerability in Ivanti Pulse Connect Secure and Pulse Policy Secure. CISA’s Known Exploited Vulnerabilities catalog records it as actively exploited and includes the note that it has known ransomware campaign use. The KEV entry instructs affected parties to apply updates per vendor instructions.

Defensive priority

High

Recommended defensive actions

  • Apply updates per vendor instructions as directed in the CISA KEV entry.
  • Inventory all Ivanti Pulse Connect Secure and Pulse Policy Secure deployments to confirm whether any affected instances remain.
  • Prioritize remediation for any exposed or internet-facing systems.
  • Verify patch completion and document remediation status for vulnerability management tracking.
  • Review relevant authentication, administration, and system logs for suspicious activity around affected systems.

Evidence notes

The evidence corpus consists of the CISA KEV source item plus official CVE and NVD record links. The CISA KEV metadata explicitly names CVE-2019-11539, classifies it as a command injection vulnerability, marks it as known exploited, records known ransomware campaign use, and gives the action to apply updates per vendor instructions. No CVSS score was provided in the supplied data.

Official resources

This debrief is based only on the supplied CVE record, CISA KEV metadata, and official reference links. The CVE publication and modification dates provided in the source data are 2021-11-03, and the KEV entry uses the same date for its add/