← Back to SOC feed Coverage →

PulseConnectSecure - CVE-2021-22893 Possible Pulse Connect Secure RCE Vulnerability Attack

kql HIGH Azure-Sentinel
T1190
exploitmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-03-25T03:06:09Z · Confidence: medium

Hunt Hypothesis

Adversaries may be exploiting the Pulse Connect Secure RCE vulnerability (CVE-2021-22893) to gain remote code execution on VPN servers. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate potential compromise of critical network infrastructure.

KQL Query

let threshold = 3;
PulseConnectSecure
| where Messages contains "Unauthenticated request url /dana-na/"
| summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by Source_IP
| where count_ > threshold

Analytic Rule Definition

id: d0c82b7f-40b2-4180-a4d6-7aa0541b7599
name: PulseConnectSecure - CVE-2021-22893 Possible Pulse Connect Secure RCE Vulnerability Attack
description: |
  'This query identifies exploitation attempts using Pulse Connect Secure(PCS) vulnerability (CVE-2021-22893) to the VPN server'
severity: High
requiredDataConnectors:
  - connectorId: PulseConnectSecure
    dataTypes: 
      - Syslog
queryFrequency: 1h
queryPeriod: 1h
triggerOperator: gt
triggerThreshold: 0
tactics:
  - InitialAccess 
relevantTechniques:
  - T1190
query: |
  let threshold = 3;
  PulseConnectSecure
  | where Messages contains "Unauthenticated request url /dana-na/"
  | summarize StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), count() by Source_IP
  | where count_ > threshold
entityMappings:
  - entityType: IP
    fieldMappings:
      - identifier: Address
        columnName: Source_IP
version: 1.0.2
kind: Scheduled
metadata:
    source:
        kind: Community
    author:
        name: Sittikorn S
    support:
        tier: Community
    categories:
        domains: [ "Security - Threat Intelligence" ]

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Detections/PulseConnectSecure/PulseConnectSecureVPN-CVE_2021_22893_Exploit.yaml