CVE-2019-0054
09.10.2019, 20:15
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
juniper | junos | 15.1x49:x49 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References