Vulnerability Name:

CVE-2019-0054 (CCN-168694)

Assigned:2018-10-11
Published:2019-10-09
Updated:2019-10-18
Summary:An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
CVSS v3 Severity:7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.6 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-295
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-0054

Source: XF
Type: UNKNOWN
juniper-cve20190054-mitm(168694)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10952
Junos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks during app-id signature updates. (CVE-2019-0054)

Source: MISC
Type: Vendor Advisory
https://kb.juniper.net/JSA10952

Source: MISC
Type: Vendor Advisory
https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:15.1x49:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d10:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d100:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d110:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d20:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d30:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d35:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d40:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d45:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d50:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d55:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d60:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d65:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d70:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d75:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d80:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:d90:*:*:*:*:*:*
  • AND
  • cpe:/h:juniper:csrx:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx110:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx1400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx1500:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx210:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx220:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx240:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx300:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx320:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx340:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx3400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx345:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx3600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4200:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx4600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx550:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx550_hm:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx5800:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:srx650:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:vsrx:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:15.1x49:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 15.1x49 -
    juniper junos 15.1x49 d10
    juniper junos 15.1x49 d100
    juniper junos 15.1x49 d110
    juniper junos 15.1x49 d20
    juniper junos 15.1x49 d30
    juniper junos 15.1x49 d35
    juniper junos 15.1x49 d40
    juniper junos 15.1x49 d45
    juniper junos 15.1x49 d50
    juniper junos 15.1x49 d55
    juniper junos 15.1x49 d60
    juniper junos 15.1x49 d65
    juniper junos 15.1x49 d70
    juniper junos 15.1x49 d75
    juniper junos 15.1x49 d80
    juniper junos 15.1x49 d90
    juniper csrx -
    juniper srx100 -
    juniper srx110 -
    juniper srx1400 -
    juniper srx1500 -
    juniper srx210 -
    juniper srx220 -
    juniper srx240 -
    juniper srx300 -
    juniper srx320 -
    juniper srx340 -
    juniper srx3400 -
    juniper srx345 -
    juniper srx3600 -
    juniper srx4100 -
    juniper srx4200 -
    juniper srx4600 -
    juniper srx5400 -
    juniper srx550 -
    juniper srx550 hm -
    juniper srx5600 -
    juniper srx5800 -
    juniper srx650 -
    juniper vsrx -
    juniper junos 15.1x49