Vulnerabilities > CVE-2015-5369 - Code vulnerability in Juniper Pulse Connect Secure
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Pulse Connect Secure (aka PCS and formerly Juniper PCS) PSC6000, PCS6500, and MAG PSC360 8.1 before 8.1r5, 8.0 before 8.0r13, 7.4 before 7.4r13.5, and 7.1 before 7.1r22.2 and PPS 5.1 before 5.1R5 and 5.0 before 5.0R13, when Hardware Acceleration is enabled, does not properly validate the Finished TLS handshake message, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted Finished message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 | |
Hardware | 3 |
Common Weakness Enumeration (CWE)
References
- http://kb.juniper.net/InfoCenter/index?page=content&id=TSB16756
- http://kb.juniper.net/InfoCenter/index?page=content&id=TSB16756
- http://www.securitytracker.com/id/1033166
- http://www.securitytracker.com/id/1033166
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40004
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40004
- https://vivaldi.net/en-US/blogs/entry/the-poodle-has-friends
- https://vivaldi.net/en-US/blogs/entry/the-poodle-has-friends