4.3
CVSSv2

CVE-2015-5369

Published: 11/08/2015 Updated: 11/08/2015
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Pulse Connect Secure (aka PCS and formerly Juniper PCS) PSC6000, PCS6500, and MAG PSC360 8.1 prior to 8.1r5, 8.0 prior to 8.0r13, 7.4 prior to 7.4r13.5, and 7.1 prior to 7.1r22.2 and PPS 5.1 prior to 5.1R5 and 5.0 prior to 5.0R13, when Hardware Acceleration is enabled, does not properly validate the Finished TLS handshake message, which makes it easier for remote malicious users to conduct man-in-the-middle attacks via a crafted Finished message.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper pulse_connect_secure 8.1

juniper pulse_connect_secure 7.4

juniper pulse_connect_secure 5.1

juniper pulse_connect_secure 8.0

juniper pulse_connect_secure 7.1

Github Repositories

Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239

pulse-secure-vpn-mitm-research Pulse Secure mitm research Release date Joint release date with vendor: 26 Oct 2020 Author David Kierznowski, @withdk Credits Sahil Mahajan from the Pulse Secure PSIRT Team for support throughout the disclosure process Alyssa Herrera, Justin Wagner, and Mimir, and Rich Warren for their write-up, "Red Teamer’s Guide to Pulse Secure SSL

Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239

pulse-secure-vpn-mitm-research Pulse Secure mitm research Release date Joint release date with vendor: 26 Oct 2020 Author David Kierznowski, @withdk Credits Sahil Mahajan from the Pulse Secure PSIRT Team for support throughout the disclosure process Alyssa Herrera, Justin Wagner, and Mimir, and Rich Warren for their write-up, "Red Teamer’s Guide to Pulse Secure SSL