Pulsant Service Status
Real-time updates of Pulsant Service issues and outages
Pulsant Service status is Operational
Pulsant Service Threat Intelligence Alert
Active Incidents
Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.
Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):
Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):
Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.
Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Recently Resolved Incidents
No recent incidents
Pulsant Service Outage Survival Guide
Pulsant Service Components
Pulsant Service Business Continuity
Cloud Backup (Asigra) Edinburgh
Cloud Backup (Asigra) Milton Keynes
Cloud Backup (Asigra) Newcastle
Cloud Backup (Asigra) Reading
Cloud Backup (Veeam) Edinburgh
Cloud Backup (Veeam) Milton Keynes
Disaster Recovery
Pulsant Service Data Centre Services
Edinburgh Medway
Edinburgh Newbridge
Edinburgh South Gyle
Glasgow
Maidenhead
Manchester
Milton Keynes
Newcastle Central
Newcastle East
Reading
Sheffield
South London
Pulsant Service Managed Cloud
Azure
AWS
Cloud Storage Edinburgh
Cloud Storage Milton Keynes
Cloud Storage Newcastle Central
Cloud Storage Newcastle East
Cloud Storage Reading
Managed Office 365
Pulsant Enterprise Cloud (PEC) Edinburgh
Pulsant Enterprise Cloud (PEC) Milton Keynes
Pulsant Enterprise Cloud (PEC) Newcastle Central
Pulsant Enterprise Cloud (PEC) Newcastle East
Pulsant Enterprise Cloud (PEC) Reading
Cloud Desktop Milton Keynes
Cloud Desktop Edinburgh
Email Security Services
Pulsant Cloud LN-1 Croydon
Pulsant Cloud SC-1 Edinburgh
Pulsant Cloud NE-1 Newcastle
Pulsant Service Managed Networks
Cloud Connect
Maidenhead
Medway
Milton Keynes
Newcastle
Newbridge
Reading
South Gyle
South London
South Yorkshire
Leased Lines
xDSL Services
IP Transit
Data Centre Failover
Content Delivery Network (CDN)
Cloud Fabric
Data Centre Connect
Metro Connect
Optical Connect
Pulsant Service Managed Security
Cloud Protect
DDoS Protect
Pulsant Service Threat Intelligence Alert
Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.
Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):
Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):
Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.
Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Pulsant Service Alternatives
Ivanti Neurons Platform (MLU)
Important Ivanti Neurons TLS Configuration Update to Avoid Service Interruptions
Today, we want to inform you of an important action you may need to take before January 2025. This action relates to an update for the TLS 1.2 configuration for Ivanti Neurons environments. The updates are designed to strengthen our collective security posture and ensure compliance with the latest security industry standards.Affected Products
· Ivanti Neurons Platform · Ivanti Neurons for Healing · Ivanti Neurons Workspace · Ivanti Neurons for Spend Intelligence · Ivanti Neurons for Discovery · Ivanti Neurons for Patch Management · Ivanti Neurons Patch for Intune · Ivanti Neurons for Digital ExperienceRequired Action to Avoid Service Interruptions
If you are using Ivanti Neurons Agents, verify, no later than January 20, 2025, that the following Cipher Suites are set up in your environment.TLS 1.2 approved Cipher Suites
· TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) (needed for Windows 10 and Windows Server 2012 support) · TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 (0xc02b) (needed for Windows 10 and Windows Server 2012 support) · TLS_ECDHE_RSA_AES128_GCM_SHA256 (0xc02f) · TLS_ECDHE_RSA_AES256_GCM_SHA384 (0xc030) · TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9) · TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)Taking this action will maintain the security and functionality of your Ivanti Neurons products.
For more information about your necessary actions, please review this FAQ.
If you have questions or require assistance, you can log a case and/or request a call in the Success Portal. Thank you for your trust in Ivanti.
Ivanti Neurons Platform (NVU)
Important Ivanti Neurons TLS Configuration Update to Avoid Service Interruptions
Today, we want to inform you of an important action you may need to take before January 2025. This action relates to an update for the TLS 1.2 configuration for Ivanti Neurons environments. The updates are designed to strengthen our collective security posture and ensure compliance with the latest security industry standards.Affected Products
· Ivanti Neurons Platform · Ivanti Neurons for Healing · Ivanti Neurons Workspace · Ivanti Neurons for Spend Intelligence · Ivanti Neurons for Discovery · Ivanti Neurons for Patch Management · Ivanti Neurons Patch for Intune · Ivanti Neurons for Digital ExperienceRequired Action to Avoid Service Interruptions
If you are using Ivanti Neurons Agents, verify, no later than January 20, 2025, that the following Cipher Suites are set up in your environment.TLS 1.2 approved Cipher Suites
· TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) (needed for Windows 10 and Windows Server 2012 support) · TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 (0xc02b) (needed for Windows 10 and Windows Server 2012 support) · TLS_ECDHE_RSA_AES128_GCM_SHA256 (0xc02f) · TLS_ECDHE_RSA_AES256_GCM_SHA384 (0xc030) · TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9) · TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)Taking this action will maintain the security and functionality of your Ivanti Neurons products.
For more information about your necessary actions, please review this FAQ.
If you have questions or require assistance, you can log a case and/or request a call in the Success Portal. Thank you for your trust in Ivanti.
BitTitan MigrationWiz
Projects in North America, Western Europe, France, and South America data centers may experience new migrations waiting in “Submitted” state for an extended period of time. We are aware of the degraded performance and are actively working to resolve the issue. Please expect an update by 3:30pm CT
BitTitan MigrationWiz DE
For customers creating new projects in the German (.de) instance of MigrationWiz, we are experiencing a user interface error where Germany is not showing on the dropdown for the regional selection list on the destination settings page. To save your project, you must select a value. This value will not impact your migration because on the performance tab, under preferred region, you will see that Germany is selected. Data will stay in the region shown on the performance tab.