Description
When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020.
No analysis available yet.
Remediation
Vendor Solution
Mist Cloud UI has been updated on September 2 2020 to resolve this specific issue.
Vendor Workaround
No workarounds are required since the issue has been resolved in the Mist cloud UI.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-12538 | When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. |
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11072 |
|
History
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T23:05:26.399Z
Reserved: 2019-11-04T00:00:00.000Z
Link: CVE-2020-1676
No data.
Status : Modified
Published: 2020-10-16T21:15:13.473
Modified: 2024-11-21T05:11:08.380
Link: CVE-2020-1676
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD