Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0849 | Juniper Identity Management Service (JIMS) for Windows versions prior to 1.1.4 may send an incorrect message to associated SRX services gateways. This may allow an attacker with physical access to an existing domain connected Windows system to bypass SRX firewall policies, or trigger a Denial of Service (DoS) condition for the network. |
Solution
The following software releases have been updated to resolve this specific issue: 1.1.4 and all subsequent releases. If suspicious or unusual usernames or IP addresses entries are present in the SRX auth table, they need to be removed from the SRX auth table.
Workaround
On the domain controller(s), edit GPO policy for Computer Configuration->Policies->Windows Settings->Security Settings->Local Policies->Audit Policy. Uncheck "Failure" for "Audit account logon events". This option is unchecked by default. In the cmd prompt, enter "gpupdate /force" to immediately update the policy change.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA10934 |
|
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T18:03:05.001Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0042
No data.
Status : Modified
Published: 2019-04-10T20:29:00.977
Modified: 2024-11-21T04:16:06.893
Link: CVE-2019-0042
No data.
OpenCVE Enrichment
No data.
EUVD