Juniper Junos Pulse Client Privilege Escalation (JSA10644)

high Nessus Plugin ID 77688

Synopsis

The remote host has a VPN Client installed that is affected by a privilege escalation vulnerability.

Description

According to its self-reported version, the installation of Junos Pulse Client on the remote Windows host is version 4.0 prior to 4.0r6 or a version prior to 3.1r8. It is, therefore, affected by a privilege escalation vulnerability that allows a local attacker to gain administrative privileges via unspecified vectors.

Solution

Upgrade to Junos Pulse Client 7.4r6 or later

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10644

https://kb.juniper.net/InfoCenter/index?page=content&id=KB29453

Plugin Details

Severity: High

ID: 77688

File Name: junos_pulse_client_jsa10644.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 9/15/2014

Updated: 10/29/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-3811

Vulnerability Information

CPE: cpe:/a:juniper:junos_pulse_client

Required KB Items: SMB/Registry/Enumerated, installed_sw/Juniper Junos Pulse Client

Exploit Ease: No known exploits are available

Patch Publication Date: 9/10/2014

Vulnerability Publication Date: 9/10/2014

Reference Information

CVE: CVE-2014-3811

BID: 69797

IAVA: 2014-A-0138-S