A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10915 | Vendor Advisory |
http://www.securityfocus.com/bid/106668 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-01-15 13:29
Updated : 2021-11-09 13:22
NVD link : CVE-2019-0015
Mitre link : CVE-2019-0015
JSON object : View
CWE
CWE-613
Insufficient Session Expiration
Products Affected
juniper
- srx210
- srx1500
- srx3600
- srx4100
- srx650
- srx550
- srx300
- srx340
- srx5600
- srx5800
- srx5400
- junos
- srx240
- srx380
- srx110
- srx3400
- srx320
- srx1400
- srx100
- srx345
- srx4000
- srx220