A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106668 | Third Party Advisory VDB Entry |
https://kb.juniper.net/JSA10915 | Vendor Advisory |
http://www.securityfocus.com/bid/106668 | Third Party Advisory VDB Entry |
https://kb.juniper.net/JSA10915 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106668 - Third Party Advisory, VDB Entry | |
References | () https://kb.juniper.net/JSA10915 - Vendor Advisory |
Information
Published : 2019-01-15 21:29
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0015
Mitre link : CVE-2019-0015
CVE.ORG link : CVE-2019-0015
JSON object : View
Products Affected
juniper
- srx1400
- srx300
- srx4000
- srx3600
- srx210
- junos
- srx340
- srx550
- srx3400
- srx5800
- srx345
- srx1500
- srx220
- srx650
- srx5600
- srx5400
- srx100
- srx110
- srx320
- srx240
- srx380
- srx4100
CWE
CWE-613
Insufficient Session Expiration