First published: Sat Aug 20 2005(Updated: )
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Neoteris Instant Virtual Extranet | =3.0 | |
Neoteris Instant Virtual Extranet | =3.1 | |
Neoteris Instant Virtual Extranet | =3.3.1 | |
Neoteris Instant Virtual Extranet | =3.3 | |
Neoteris Instant Virtual Extranet | =3.2 | |
Juniper ScreenOS | =2.6.1r2 | |
Juniper ScreenOS | =2.6.1r12 | |
Juniper ScreenOS | =3.1.0r10 | |
Juniper ScreenOS | =4.0.0r5 | |
Juniper ScreenOS | =4.0.0 | |
Juniper ScreenOS | =3.0.3r5 | |
Juniper ScreenOS | =2.6.1r1 | |
Juniper ScreenOS | =4.0.0r2 | |
Juniper ScreenOS | =4.0.0r7 | |
Juniper ScreenOS | =2.6.1r8 | |
Juniper ScreenOS | =1.66 | |
Juniper ScreenOS | =2.5 | |
Juniper ScreenOS | =2.7.1 | |
Juniper ScreenOS | =4.0.1r1 | |
Juniper ScreenOS | =3.0.1r3 | |
Juniper ScreenOS | =2.5r6 | |
Juniper ScreenOS | =3.0.3r2 | |
Juniper ScreenOS | =4.0.0r4 | |
Juniper ScreenOS | =4.0.1r8 | |
Juniper ScreenOS | =3.1.0r4 | |
Juniper ScreenOS | =3.1.0r8 | |
Juniper ScreenOS | =4.0.0r6 | |
Juniper ScreenOS | =2.6.1r6 | |
Juniper ScreenOS | =4.0.0r11 | |
Juniper ScreenOS | =4.0.1r2 | |
Juniper ScreenOS | =3.0.3r1 | |
Juniper ScreenOS | =3.1.0r3 | |
Juniper ScreenOS | =2.6.1r7 | |
Juniper ScreenOS | =4.0.3r3 | |
Juniper ScreenOS | =3.0.2 | |
Netscreen Ns-50ns25 | =5.0.0_r6.0 | |
Netscreen Ns-204 | =5.0.0_r6.0 | |
Juniper ScreenOS | =2.8_r1 | |
Juniper ScreenOS | =4.0.2 | |
Juniper ScreenOS | =4.0.0r1 | |
Juniper ScreenOS | =1.64 | |
Juniper ScreenOS | =3.1.0r12 | |
Juniper ScreenOS | =2.6.1r11 | |
Juniper ScreenOS | =2.8 | |
Juniper ScreenOS | =2.10_r4 | |
Juniper ScreenOS | =2.6.1 | |
Juniper ScreenOS | =3.0.3 | |
Juniper ScreenOS | =3.1.0r2 | |
Juniper ScreenOS | =3.0.1r7 | |
Juniper ScreenOS | =3.0.0r3 | |
Juniper ScreenOS | =3.0.0r1 | |
Juniper ScreenOS | =1.7 | |
Netscreen Ns-500 | =4110.0_11_5.1.0_r3a | |
Juniper ScreenOS | =3.0.3_r1.1 | |
Juniper ScreenOS | =3.1.1_r2 | |
Juniper ScreenOS | =3.0.1r2 | |
Juniper ScreenOS | =3.1.0r5 | |
Juniper ScreenOS | =2.5r2 | |
Juniper ScreenOS | =2.1 | |
Juniper Networks NetScreen-IDP 100 | =3.0_.pe1.0 | |
Juniper ScreenOS | =3.0.3r4 | |
Juniper ScreenOS | =2.10_r3 | |
Juniper ScreenOS | =4.0.0r9 | |
Juniper ScreenOS | =4.0.3r2 | |
Juniper ScreenOS | =2.7.1r3 | |
Netscreen Ns-204 | =0110.0_11_4.0_r10.0 | |
Juniper ScreenOS | =3.1.0r7 | |
Juniper ScreenOS | =4.0.3r4 | |
Juniper ScreenOS | =3.1.0r9 | |
Juniper ScreenOS | =3.0.1r5 | |
Juniper ScreenOS | =4.0.1r7 | |
Juniper ScreenOS | =3.0.3r6 | |
Juniper ScreenOS | =3.0.0 | |
Juniper ScreenOS | =5.2.0 | |
Juniper ScreenOS | =4.0.1r5 | |
Netscreen Ns-500 | =4110.0_11_4.0_r10.0 | |
Juniper ScreenOS | =1.66_r2 | |
Juniper ScreenOS | =3.0.0r4 | |
Juniper ScreenOS | =3.0.3r7 | |
Juniper ScreenOS | =4.0.1r6 | |
Juniper ScreenOS | =4.0.3 | |
Juniper ScreenOS | =5.1.0r3a | |
Juniper ScreenOS | =1.73_r2 | |
Juniper ScreenOS | =2.6.1r5 | |
Juniper ScreenOS | =3.1.0 | |
Juniper ScreenOS | =4.0.1 | |
Juniper ScreenOS | =4.0.3r1 | |
Juniper ScreenOS | =4.0.1r3 | |
Juniper ScreenOS | =2.5r1 | |
Juniper ScreenOS | =4.0.0 | |
Juniper ScreenOS | =3.1.0r11 | |
Juniper ScreenOS | =2.1_r6 | |
Juniper ScreenOS | =2.7.1r1 | |
Juniper ScreenOS | =2.6.0 | |
Juniper ScreenOS | =3.0.3r3 | |
Juniper ScreenOS | =5.0.0 | |
Juniper ScreenOS | =4.0.0r10 | |
Juniper ScreenOS | =4.0.0r8 | |
Juniper ScreenOS | =3.1.0r6 | |
Juniper ScreenOS | =4.0.1r4 | |
Juniper ScreenOS | =2.6.1r10 | |
Juniper ScreenOS | =4.0.1r10 | |
Juniper ScreenOS | =2.6.1r9 | |
Juniper ScreenOS | =2.7.1r2 | |
Juniper ScreenOS | =4.0.0r12 | |
Juniper ScreenOS | =2.6.1r4 | |
Juniper ScreenOS | =3.1.0r1 | |
Juniper ScreenOS | =3.0.0r2 | |
Juniper ScreenOS | =3.0.1r4 | |
Juniper ScreenOS | =3.0.3r8 | |
Juniper ScreenOS | =1.73_r1 | |
Juniper ScreenOS | =3.0.1 | |
Netscreen Ns-204 | =0110.0_11_5.1.0_r3a | |
Juniper ScreenOS | =4.0.0r3 | |
Juniper ScreenOS | =2.1_r7 | |
Juniper ScreenOS | =2.6.1r3 | |
Netscreen Ns-10 | ||
Juniper ScreenOS | =5.1.0 | |
Juniper ScreenOS | =3.0.1r6 | |
Juniper ScreenOS | =2.0.1_r8 | |
Juniper ScreenOS | =4.0.1r9 | |
Juniper ScreenOS | =3.0.1r1 | |
Juniper netscreen-idp 1000 | =3.0 | |
Netscreen Netscreen-sa 5020 Series | =4.2_r2.2 | |
Juniper Networks NetScreen-IDP 100 | =3.0.1_r1 | |
Juniper Networks IDP 500 | =3.0.1_r1 | |
Juniper netscreen-idp 1000 | =3.0r1 | |
Netscreen Netscreen-sa 5000 Series | ||
Juniper netscreen-idp 1000 | =3.0r2 | |
Juniper Netscreen-IDP 10 | =3.0.1_r1 | |
Juniper Netscreen-5GT | =5.0 | |
Juniper netscreen-idp 1000 | =3.0.1_r1 | |
Netscreen Netscreen-sa 5050 Series | =4.2_r2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2640 is classified as a moderate severity vulnerability due to the potential for information disclosure.
To fix CVE-2005-2640, upgrade Juniper Netscreen VPN running ScreenOS to version 5.2.1 or later.
CVE-2005-2640 allows remote attackers to enumerate valid usernames, posing a risk of unauthorized access.
CVE-2005-2640 affects Juniper Netscreen VPN devices running ScreenOS 5.2.0 and earlier.
Yes, CVE-2005-2640 can be exploited remotely if a vulnerable device is reachable over the network.