CVE-2019-0015
high-risk
Published 2019-01-15
A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
Do I need to act?
-
0.19% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.4/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (4)
Third Party Advisory
http://www.securityfocus.com/bid/106668
Vendor Advisory
https://kb.juniper.net/JSA10915
Third Party Advisory
http://www.securityfocus.com/bid/106668
Vendor Advisory
https://kb.juniper.net/JSA10915
50
/ 100
high-risk
Severity
21/34 · High
Exploitability
1/34 · Minimal
Exposure
28/34 · Critical