Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0015— Junos OS: SRX Series: Deleted dynamic VPN users are allowed to establish VPN connections until reboot

EPSS 0.19% · P41
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-0015

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: SRX Series: Deleted dynamic VPN users are allowed to establish VPN connections until reboot
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks SRX Series 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks SRX Series是美国瞻博网络(Juniper Networks)公司的一套SRX系列服务网关设备。 Juniper Networks SRX Series上的Junos OS中的Service Gateway存在代码问题漏洞。攻击者可利用该漏洞在设备重启前创建动态VPN连接。以下版本受到影响:Juniper Junos OS 12.3X48-D75之前的12.3X48版本,15.1X49-D150之前的15.1X49版本,17.3R3之前的17.3版本,17.4R2
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 12.3X48 ~ 12.3X48-D75 -

II. Public POCs for CVE-2019-0015

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-0015

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2019-01-15 · 26 CVEs total

CVE-2019-0016Junos Space: Authenticated user able to delete devices without delete device privileges
CVE-2019-0030Juniper ATP: Password hashing uses DES and a hardcoded salt
CVE-2019-0029Juniper ATP: Splunk credentials are in logged in clear text
CVE-2019-0027Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration
CVE-2019-0026Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration
CVE-2019-0025Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu
CVE-2019-0024Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu
CVE-2019-0023Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu
CVE-2019-0022Juniper ATP: Two hard coded credentials sharing the same password give an attacker the abi
CVE-2019-0021Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text
CVE-2019-0020Juniper ATP: Hard coded credentials used in Web Collector
CVE-2019-0018Juniper ATP: Persistent Cross-Site Scripting (XSS) vulnerability in file upload menu
CVE-2019-0017Junos Space: Unrestricted file upload vulnerability
CVE-2019-0001Junos OS: MX Series: uncontrolled recursion and crash in Broadband Edge subscriber managem
CVE-2019-0014Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packe
CVE-2019-0013Junos OS: RPD crash upon receipt of malformed PIM packet
CVE-2019-0012Junos OS: rpd crash on VPLS PE upon receipt of specific BGP message
CVE-2019-0011Junos OS: Kernel crash after processing specific incoming packet to the out of band manage
CVE-2019-0010Junos OS: SRX Series: Crafted HTTP traffic may cause UTM to consume all mbufs, leading to
CVE-2019-0009Junos OS: EX2300 and EX3400: High disk I/O operations may disrupt the communication betwee

Showing top 20 of 26 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-0015

No comments yet


Leave a comment