An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
References
Link | Resource |
---|---|
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html | Vendor Advisory |
https://kb.juniper.net/JSA10952 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-10-09 13:15
Updated : 2019-10-17 18:31
NVD link : CVE-2019-0054
Mitre link : CVE-2019-0054
JSON object : View
CWE
CWE-295
Improper Certificate Validation
Products Affected
juniper
- srx210
- srx1500
- srx3600
- srx550_hm
- srx4100
- srx650
- srx550
- srx4600
- srx300
- srx4200
- vsrx
- srx340
- srx5600
- srx5800
- srx5400
- junos
- srx240
- srx110
- srx3400
- srx320
- srx1400
- srx100
- srx345
- csrx
- srx220