Lucene search

K
cve[email protected]CVE-2015-5369
HistoryAug 11, 2015 - 2:59 p.m.

CVE-2015-5369

2015-08-1114:59:12
CWE-17
CWE-20
web.nvd.nist.gov
34
cve-2015-5369
pulse connect secure
pcs
juniper pcs
mag psc360
security vulnerability
mitm attack
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

8.9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.5%

Pulse Connect Secure (aka PCS and formerly Juniper PCS) PSC6000, PCS6500, and MAG PSC360 8.1 before 8.1r5, 8.0 before 8.0r13, 7.4 before 7.4r13.5, and 7.1 before 7.1r22.2 and PPS 5.1 before 5.1R5 and 5.0 before 5.0R13, when Hardware Acceleration is enabled, does not properly validate the Finished TLS handshake message, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted Finished message.

Affected configurations

NVD
Node
juniperpulse_connect_secureMatch5.1
OR
juniperpulse_connect_secureMatch7.1
OR
juniperpulse_connect_secureMatch7.4
OR
juniperpulse_connect_secureMatch8.0
OR
juniperpulse_connect_secureMatch8.1
AND
junipermag_pcs360Match-
OR
juniperpcs6000Match-
OR
juniperpcs6500Match-

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

8.9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.5%

Related for CVE-2015-5369