Juniper Identity Management Service (JIMS) for Windows versions prior to 1.1.4 may send an incorrect message to associated SRX services gateways. This may allow an attacker with physical access to an existing domain connected Windows system to bypass SRX firewall policies, or trigger a Denial of Service (DoS) condition for the network.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0849 Juniper Identity Management Service (JIMS) for Windows versions prior to 1.1.4 may send an incorrect message to associated SRX services gateways. This may allow an attacker with physical access to an existing domain connected Windows system to bypass SRX firewall policies, or trigger a Denial of Service (DoS) condition for the network.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: 1.1.4 and all subsequent releases. If suspicious or unusual usernames or IP addresses entries are present in the SRX auth table, they need to be removed from the SRX auth table.


Workaround

On the domain controller(s), edit GPO policy for Computer Configuration->Policies->Windows Settings->Security Settings->Local Policies->Audit Policy. Uncheck "Failure" for "Audit account logon events". This option is unchecked by default. In the cmd prompt, enter "gpupdate /force" to immediately update the policy change.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T18:03:05.001Z

Reserved: 2018-10-11T00:00:00

Link: CVE-2019-0042

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-10T20:29:00.977

Modified: 2024-11-21T04:16:06.893

Link: CVE-2019-0042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.