CVE-2019-0054
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
09/10/2019
Last modified:
18/10/2019
Description
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
Impact
Base Score 3.x
7.40
Severity 3.x
HIGH
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



