CVE-2019-0015Insufficient Session Expiration in Networks Junos OS

Severity
5.4MEDIUMNVD
EPSS
0.2%
top 58.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateMay 13

Description

A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages4 packages

CVEListV5juniper_networks/junos_os12.3X4812.3X48-D75+5
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

1
GHSA
GHSA-c5qw-pgmj-mr6g: A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted2022-05-13

📋Vendor Advisories

2
VMware
VMware Cloud Foundation and VMware Harbor Container Registry for PCF address remote escalation of privilege vulnerability (CVE-2019-16097)2019-09-24
Juniper
CVE-2019-0015: A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted.2019-01-15
CVE-2019-0015 — Insufficient Session Expiration | cvebase