This vulnerability is only exploitable when Embedded Browser is configured along with Credential Provider. This vulnerability only affects Windows PDC if the Embedded Browser is configured with the Credential Provider.
Pulse Secure Desktop Client ( Linux ) could allow local attackers to perform buffer overflow. Pulse Secure Desktop Client ( Linux ) could allow local attackers to escalate privilege. This following PCS/PPS & PDC version can be downloaded from. Pulse Secure has released software updates that address these vulnerabilities.
The solution for these vulnerabilities is to upgrade the Pulse Connect Secure, Pulse Policy Secure, and Pulse Secure Desktop Client software version to the 9.1R9. These issues are resolved in the following releases: