An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10952 | Vendor Advisory |
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html | Vendor Advisory |
https://kb.juniper.net/JSA10952 | Vendor Advisory |
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA10952 - Vendor Advisory | |
References | () https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.8 |
Information
Published : 2019-10-09 20:15
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0054
Mitre link : CVE-2019-0054
CVE.ORG link : CVE-2019-0054
JSON object : View
Products Affected
juniper
- srx1400
- srx300
- srx4600
- srx3600
- srx210
- junos
- srx550_hm
- srx340
- srx550
- srx4200
- srx3400
- csrx
- srx5800
- srx345
- srx1500
- srx220
- srx650
- srx5600
- srx5400
- srx100
- srx110
- srx320
- srx240
- vsrx
- srx4100