Vulnerabilities > CVE-2019-0015 - Insufficient Session Expiration vulnerability in Juniper Junos

047910
CVSS 5.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
LOW
Integrity impact
LOW
Availability impact
NONE
network
low complexity
juniper
CWE-613
nessus

Summary

A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.

Common Weakness Enumeration (CWE)

Nessus

NASL familyJunos Local Security Checks
NASL idJUNIPER_JSA10915.NASL
descriptionAccording to its self-reported version number, the remote Juniper Junos device is affected by a vulnerability that allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted.
last seen2020-06-01
modified2020-06-02
plugin id121643
published2019-02-07
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/121643
titleJunos OS: Deleted dynamic VPN users are allowed to establish VPN connections until reboot (JSA10915)