First published: Mon Sep 29 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the SSL VPN/UAC web server in the Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS 7.1 before 7.1r16, 7.4 before 7.4r3, and 8.0 before 8.0r1 and the Juniper Junos Pulse Access Control Service devices with UAC OS 4.1 before 4.1r8, 4.4 before 4.4r3 and 5.0 before 5.0r1 allows remote administrators to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Pulse Access Control Service | =4.1 | |
Juniper Junos Pulse Access Control Service | =4.1r1 | |
Juniper Junos Pulse Access Control Service | =4.1r1.1 | |
Juniper Junos Pulse Access Control Service | =4.1r2 | |
Juniper Junos Pulse Access Control Service | =4.1r3 | |
Juniper Junos Pulse Access Control Service | =4.1r4 | |
Juniper Junos Pulse Access Control Service | =4.1r5 | |
Juniper Junos Pulse Access Control Service | =4.4 | |
Juniper Junos Pulse Access Control Service | =4.4-r1 | |
Juniper Junos Pulse Access Control Service | =4.4-r2 | |
Juniper Junos Pulse Access Control Service | =5.0 | |
Juniper Junos Pulse Access Control Service | =7.1 | |
Juniper Junos Pulse Access Control Service | =7.1r1 | |
Juniper Junos Pulse Access Control Service | =7.1r1.1 | |
Juniper Junos Pulse Access Control Service | =7.1r2 | |
Juniper Junos Pulse Access Control Service | =7.1r3 | |
Juniper Junos Pulse Access Control Service | =7.1r4 | |
Juniper Junos Pulse Access Control Service | =7.1r5 | |
Juniper Junos Pulse Access Control Service | =7.1r6 | |
Juniper Junos Pulse Access Control Service | =7.1r7 | |
Juniper Junos Pulse Access Control Service | =7.1r8 | |
Juniper Junos Pulse Access Control Service | =7.1r9 | |
Juniper Junos Pulse Access Control Service | =7.1r10 | |
Juniper Junos Pulse Access Control Service | =7.1r11 | |
Juniper Junos Pulse Access Control Service | =7.1r12 | |
Juniper Junos Pulse Access Control Service | =7.1r13 | |
Juniper Junos Pulse Access Control Service | =7.1r14 | |
Juniper Junos Pulse Access Control Service | =7.1r15 | |
Juniper Junos Pulse Access Control Service | =7.4 | |
Juniper Junos Pulse Access Control Service | =7.4-r1.0 | |
Juniper Junos Pulse Access Control Service | =7.4-r2.0 | |
Juniper Junos Pulse Access Control Service | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3820 is classified as a Medium severity vulnerability.
To fix CVE-2014-3820, upgrade to Junos Pulse Secure Access Service version 7.1r16, 7.4r3, or 8.0r1 or later.
CVE-2014-3820 can allow attackers to execute cross-site scripting (XSS) attacks.
CVE-2014-3820 affects Juniper Junos Pulse Secure Access Service versions prior to 7.1r16, 7.4r3, and 8.0r1, as well as Junos Pulse Access Control Service versions prior to 4.1r8.
If you're using the affected software for CVE-2014-3820, you should prioritize upgrading to a patched version immediately to mitigate the risk.