First published: Mon Oct 05 2015(Updated: )
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 allows remote authenticated users to bypass intended access restrictions and log into arbitrary meetings by leveraging a meeting id and meetingAppSun.jar.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pulse Secure Pulse Connect Secure | =7.1 | |
Pulse Secure Pulse Connect Secure | =7.4 | |
Pulse Secure Pulse Connect Secure | =8.0 | |
Pulse Secure Pulse Connect Secure | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7323 has a high severity rating due to its potential to allow unauthorized access to meetings.
To fix CVE-2015-7323, upgrade Pulse Connect Secure to versions 7.1R22.1, 7.4, 8.0R11, or 8.1R3 or later.
The vulnerability CVE-2015-7323 impacts users of Pulse Connect Secure versions prior to 7.1R22.1, 7.4, 8.0R11, and 8.1R3.
CVE-2015-7323 enables remote authenticated users to bypass access restrictions to log into arbitrary meetings.
Unfortunately, there is no known workaround for CVE-2015-7323, and upgrading is the recommended action.