Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2019-0054
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 4.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- Partial
CVSSv3.1 Score
- Severity
- High
- Base Score
- 7.4/10
- Exploit Score
- 2.2/10
- Access Vector
- Network
- Access Complexity
- High
- Privileges Required
- None
- Impact Score
- 5.2/10
- Confidentiality Impact
- High
- Availability Impact
- None
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:* |
No
|
- |