Project Subscriptions
| Vendors | Products |
|---|---|
|
Juniper
Subscribe
|
Junos
Subscribe
Srx100
Subscribe
Srx110
Subscribe
Srx1400
Subscribe
Srx1500
Subscribe
Srx210
Subscribe
Srx220
Subscribe
Srx240
Subscribe
Srx300
Subscribe
Srx320
Subscribe
Srx340
Subscribe
Srx3400
Subscribe
Srx345
Subscribe
Srx3600
Subscribe
Srx4100
Subscribe
Srx4200
Subscribe
Srx5400
Subscribe
Srx550
Subscribe
Srx5600
Subscribe
Srx5800
Subscribe
Srx650
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0849 | When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-the-middle attack or by authentic servers subverted by malicious actors. FTP, and Telnet pass-through authentication services are not affected. Affected releases are Juniper Networks SRX Series: 12.1X46 versions prior to 12.1X46-D67 on SRX Series; 12.3X48 versions prior to 12.3X48-D25 on SRX Series; 15.1X49 versions prior to 15.1X49-D35 on SRX Series. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS:12.1X46-D67, 12.3X48-D25, 15.1X49-D35, 17.3R1 all subsequent releases.
Workaround
1. Discontinue use of HTTP/HTTPS Pass-through Firewall User Authentication 2. Use web-redirect when using Pass-through Firewall User Authentication Example: set security policies from-zone * to-zone * policy * then permit firewall-authentication pass-through web-redirect For additional configuration guidance, customers should contact JTAC Support.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T17:18:55.431Z
Reserved: 2017-11-16T00:00:00
Link: CVE-2018-0025
No data.
Status : Modified
Published: 2018-07-11T18:29:00.230
Modified: 2024-11-21T03:37:23.147
Link: CVE-2018-0025
No data.
OpenCVE Enrichment
No data.
EUVD