First published: Tue Jan 15 2019(Updated: )
A vulnerability in the SRX Series Service Gateway allows deleted dynamic VPN users to establish dynamic VPN connections until the device is rebooted. A deleted dynamic VPN connection should be immediately disallowed from establishing new VPN connections. Due to an error in token caching, deleted users are allowed to connect once a previously successful dynamic VPN connection has been established. A reboot is required to clear the cached authentication token. Affected releases are Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D75; 15.1X49 versions prior to 15.1X49-D150; 17.3 versions prior to 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R3; 18.2 versions prior to 18.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.3x48 | |
Juniper JUNOS | =12.3x48-d10 | |
Juniper JUNOS | =12.3x48-d100 | |
Juniper JUNOS | =12.3x48-d15 | |
Juniper JUNOS | =12.3x48-d20 | |
Juniper JUNOS | =12.3x48-d25 | |
Juniper JUNOS | =12.3x48-d30 | |
Juniper JUNOS | =12.3x48-d35 | |
Juniper JUNOS | =12.3x48-d40 | |
Juniper JUNOS | =12.3x48-d45 | |
Juniper JUNOS | =12.3x48-d50 | |
Juniper JUNOS | =12.3x48-d51 | |
Juniper JUNOS | =12.3x48-d55 | |
Juniper JUNOS | =12.3x48-d60 | |
Juniper JUNOS | =12.3x48-d65 | |
Juniper JUNOS | =12.3x48-d66 | |
Juniper JUNOS | =12.3x48-d70 | |
Juniper JUNOS | =15.1x49 | |
Juniper JUNOS | =15.1x49-d10 | |
Juniper JUNOS | =15.1x49-d100 | |
Juniper JUNOS | =15.1x49-d110 | |
Juniper JUNOS | =15.1x49-d120 | |
Juniper JUNOS | =15.1x49-d130 | |
Juniper JUNOS | =15.1x49-d131 | |
Juniper JUNOS | =15.1x49-d140 | |
Juniper JUNOS | =15.1x49-d15 | |
Juniper JUNOS | =15.1x49-d20 | |
Juniper JUNOS | =15.1x49-d25 | |
Juniper JUNOS | =15.1x49-d30 | |
Juniper JUNOS | =15.1x49-d35 | |
Juniper JUNOS | =15.1x49-d40 | |
Juniper JUNOS | =15.1x49-d45 | |
Juniper JUNOS | =15.1x49-d50 | |
Juniper JUNOS | =15.1x49-d55 | |
Juniper JUNOS | =15.1x49-d60 | |
Juniper JUNOS | =15.1x49-d65 | |
Juniper JUNOS | =15.1x49-d70 | |
Juniper JUNOS | =15.1x49-d75 | |
Juniper JUNOS | =15.1x49-d80 | |
Juniper JUNOS | =15.1x49-d90 | |
Juniper JUNOS | =17.3 | |
Juniper JUNOS | =17.3-r1 | |
Juniper JUNOS | =17.3-r1-s1 | |
Juniper JUNOS | =17.3-r1-s4 | |
Juniper JUNOS | =17.3-r2 | |
Juniper JUNOS | =17.3-r2-s1 | |
Juniper JUNOS | =17.3-r2-s2 | |
Juniper JUNOS | =17.3-r2-s3 | |
Juniper JUNOS | =17.3-r2-s4 | |
Juniper JUNOS | =17.3-r2-s5 | |
Juniper JUNOS | =17.4 | |
Juniper JUNOS | =17.4-r1 | |
Juniper JUNOS | =17.4-r1-s1 | |
Juniper JUNOS | =17.4-r1-s2 | |
Juniper JUNOS | =17.4-r1-s3 | |
Juniper JUNOS | =17.4-r1-s4 | |
Juniper JUNOS | =17.4-r1-s5 | |
Juniper JUNOS | =17.4-r1-s6 | |
Juniper JUNOS | =17.4-r1-s7 | |
Juniper JUNOS | =18.1 | |
Juniper JUNOS | =18.1-r | |
Juniper JUNOS | =18.1-r1 | |
Juniper JUNOS | =18.1-r2 | |
Juniper JUNOS | =18.1-r2-s1 | |
Juniper JUNOS | =18.1-r2-s2 | |
Juniper JUNOS | =18.1-r2-s4 | |
Juniper JUNOS | =18.2 | |
Juniper JUNOS | =18.2-r | |
Juniper JUNOS | =18.2-r1 | |
Juniper JUNOS | =18.2-r1 | |
Juniper JUNOS | =18.2-r1-s2 | |
Juniper JUNOS | =18.2-r1-s3 | |
Juniper JUNOS | =18.2-r1-s4 | |
Juniper JUNOS | =18.2-r1-s5 | |
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX1500 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX300 | ||
Juniper SRX320 | ||
Juniper SRX340 | ||
Juniper SRX3400 | ||
Juniper SRX345 | ||
Juniper SRX3600 | ||
Juniper SRX380 | ||
Juniper SRX4000 | ||
Juniper SRX4100 | ||
Juniper SRX5400 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 |
The following software releases have been updated to resolve this specific issue: Junos OS 12.3X48-D75, 15.1X49-D150, 17.3R3, 17.4R2, 18.1R3, 18.2R2, 18.3R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0015 is classified as a high severity vulnerability due to its potential impact on the security of dynamic VPN connections.
To fix CVE-2019-0015, you should update your Juniper JUNOS software to the latest patched version that addresses this vulnerability.
CVE-2019-0015 affects Juniper SRX Series Service Gateways running specific versions of JUNOS.
The primary impact of CVE-2019-0015 is that it allows deleted dynamic VPN users to reconnect until the device is rebooted.
Currently, there are no recommended workarounds for CVE-2019-0015; updating to a secure version is necessary.