Vulnerability Details CVE-2019-0054
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 24.9%
CVSS Severity
CVSS v3 Score 6.8
CVSS v2 Score 5.8
Products affected by CVE-2019-0054
-
-
cpe:2.3:h:juniper:srx100:-
-
cpe:2.3:h:juniper:srx110:-
-
cpe:2.3:h:juniper:srx1400:-
-
cpe:2.3:h:juniper:srx1500:-
-
cpe:2.3:h:juniper:srx210:-
-
cpe:2.3:h:juniper:srx220:-
-
cpe:2.3:h:juniper:srx240:-
-
cpe:2.3:h:juniper:srx300:-
-
cpe:2.3:h:juniper:srx320:-
-
cpe:2.3:h:juniper:srx3400:-
-
cpe:2.3:h:juniper:srx340:-
-
cpe:2.3:h:juniper:srx345:-
-
cpe:2.3:h:juniper:srx3600:-
-
cpe:2.3:h:juniper:srx4100:-
-
cpe:2.3:h:juniper:srx4200:-
-
cpe:2.3:h:juniper:srx4600:-
-
cpe:2.3:h:juniper:srx5400:-
-
cpe:2.3:h:juniper:srx550:-
-
cpe:2.3:h:juniper:srx550_hm:-
-
cpe:2.3:h:juniper:srx5600:-
-
cpe:2.3:h:juniper:srx5800:-
-
cpe:2.3:h:juniper:srx650:-
-
-
cpe:2.3:o:juniper:junos:15.1x49