Pulsant Service Status
Real-time updates of Pulsant Service issues and outages
Pulsant Service status is Operational
Pulsant Service Threat Intelligence Alert
Active Incidents
No active incidents
Recently Resolved Incidents
Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.
Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):
Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):
Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.
Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Pulsant Service Outage Survival Guide
Pulsant Service Components
Pulsant Service Business Continuity
Cloud Backup (Asigra) Edinburgh
Cloud Backup (Asigra) Milton Keynes
Cloud Backup (Asigra) Newcastle
Cloud Backup (Asigra) Reading
Cloud Backup (Veeam) Edinburgh
Cloud Backup (Veeam) Milton Keynes
Disaster Recovery
Pulsant Service Data Centre Services
Edinburgh Medway
Edinburgh Newbridge
Edinburgh South Gyle
Glasgow
Maidenhead
Manchester
Milton Keynes
Newcastle Central
Newcastle East
Reading
Sheffield
South London
Pulsant Service Managed Cloud
Azure
AWS
Cloud Storage Edinburgh
Cloud Storage Milton Keynes
Cloud Storage Newcastle Central
Cloud Storage Newcastle East
Cloud Storage Reading
Managed Office 365
Pulsant Enterprise Cloud (PEC) Edinburgh
Pulsant Enterprise Cloud (PEC) Milton Keynes
Pulsant Enterprise Cloud (PEC) Newcastle Central
Pulsant Enterprise Cloud (PEC) Newcastle East
Pulsant Enterprise Cloud (PEC) Reading
Cloud Desktop Milton Keynes
Cloud Desktop Edinburgh
Email Security Services
Pulsant Cloud LN-1 Croydon
Pulsant Cloud SC-1 Edinburgh
Pulsant Cloud NE-1 Newcastle
Pulsant Service Managed Networks
Cloud Connect
Maidenhead
Medway
Milton Keynes
Newcastle
Newbridge
Reading
South Gyle
South London
South Yorkshire
Leased Lines
xDSL Services
IP Transit
Data Centre Failover
Content Delivery Network (CDN)
Cloud Fabric
Data Centre Connect
Metro Connect
Optical Connect
Pulsant Service Managed Security
Cloud Protect
DDoS Protect
Pulsant Service Threat Intelligence Alert
Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.
Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):
Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):
Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.
Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Pulsant Service Alternatives
US AMS
Today, we want to inform you of an important change that will take place on January 22nd, 2025. This action relates to the removal of support for TLS 1.0 and TLS 1.1 configurations for All HOSTED Ivanti/Cherwell environments. The changes are designed to strengthen our collective security posture and ensure compliance with the latest security industry standards.
Affected Products
Ivanti Cherwell CSM 9.5 and Older
Ivanti Cherwell CAM 12.0 and Older
Required Action to Avoid Service Interruptions
If you are using HOSTED Ivanti/Cherwell CSM 9.5 and older or Ivanti/Cherwell CAM Products 12.0 and older, verify, no later than 12:00PM MST January 22, 2025. Most customers will not be impacted by this change.
Taking this action will maintain the security and functionality of your Ivanti/Cherwell products.
If you have questions or require assistance, you can log a case and/or request a call in the Success Portal. Thank you for your trust in Ivanti.
US Datacenter
Today, we want to inform you of an important change that will take place on January 22nd, 2025. This action relates to the removal of support for TLS 1.0 and TLS 1.1 configurations for All HOSTED Ivanti/Cherwell environments. The changes are designed to strengthen our collective security posture and ensure compliance with the latest security industry standards.
Affected Products
Ivanti Cherwell CSM 9.5 and Older
Ivanti Cherwell CAM 12.0 and Older
Required Action to Avoid Service Interruptions
If you are using HOSTED Ivanti/Cherwell CSM 9.5 and older or Ivanti/Cherwell CAM Products 12.0 and older, verify, no later than 12:00PM MST January 22, 2025. Most customers will not be impacted by this change.
Taking this action will maintain the security and functionality of your Ivanti/Cherwell products.
If you have questions or require assistance, you can log a case and/or request a call in the Success Portal. Thank you for your trust in Ivanti.
BitTitan MigrationWiz
Projects in North America, Western Europe, France, and South America data centers may experience new migrations waiting in “Submitted” state for an extended period of time. We are aware of the degraded performance and are actively working to resolve the issue. Please expect an update by 3:30pm CT
BitTitan MigrationWiz DE
For customers creating new projects in the German (.de) instance of MigrationWiz, we are experiencing a user interface error where Germany is not showing on the dropdown for the regional selection list on the destination settings page. To save your project, you must select a value. This value will not impact your migration because on the performance tab, under preferred region, you will see that Germany is selected. Data will stay in the region shown on the performance tab.