| Vulnerability Name: | CVE-2015-7323 (CCN-106689) | ||||||||
| Assigned: | 2015-09-24 | ||||||||
| Published: | 2015-09-24 | ||||||||
| Updated: | 2016-12-08 | ||||||||
| Summary: | The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 allows remote authenticated users to bypass intended access restrictions and log into arbitrary meetings by leveraging a meeting id and meetingAppSun.jar. | ||||||||
| CVSS v3 Severity: | 5.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N) 4.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||
| CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N)
| ||||||||
| Vulnerability Type: | CWE-264 | ||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||
| References: | Source: MITRE Type: CNA CVE-2015-7323 Source: CCN Type: Full-Disclosure Mailing List, Thu, 24 Sep 2015 17:29:36 +0200 CVE-2015-7323 - Secure Meeting (Pulse Collaboration) issue may allow authenticated users to bypass meeting authorization Source: FULLDISC Type: Exploit 20150925 CVE-2015-7323 - Secure Meeting (Pulse Collaboration) issue may allow authenticated users to bypass meeting authorization Source: SECTRACK Type: UNKNOWN 1033684 Source: XF Type: UNKNOWN junos-pulse-cve20157323-sec-bypass(106689) Source: CCN Type: PulseSecure Security Advisory SA40054 - 2015-09 Security Advisory: Secure Meeting (Pulse Collaboration) issue may allow authenticated users to bypass meeting authorization (CVE-2015-7323) Source: CONFIRM Type: Vendor Advisory https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40054 Source: CCN Type: Packet Storm Security [09-25-2015] Junos Pulse Secure Meeting 8.0.5 Access Bypass Source: MISC Type: Exploit https://packetstormsecurity.com/files/133711/Junos-Pulse-Secure-Meeting-8.0.5-Access-Bypass.html Source: MISC Type: Exploit https://profundis-labs.com/advisories/CVE-2015-7323.txt | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||