Vulnerabilities > CVE-2019-0015 - Insufficient Session Expiration vulnerability in Juniper Junos
Summary
A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 74 | |
Hardware | Juniper
| 21 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Junos Local Security Checks |
NASL id | JUNIPER_JSA10915.NASL |
description | According to its self-reported version number, the remote Juniper Junos device is affected by a vulnerability that allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 121643 |
published | 2019-02-07 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/121643 |
title | Junos OS: Deleted dynamic VPN users are allowed to establish VPN connections until reboot (JSA10915) |