Junos Pulse Secure Access IVE / UAC OS Weak Cipher Information Disclosure (JSA10628)

Medium Nessus Plugin ID 76306


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, the version of IVE / UAC OS running on the remote host is affected by an information disclosure vulnerability due to an issue where cipher suites with weak encryption algorithms are used even when cipher suites with strong encryption algorithms are enabled.


Upgrade to Juniper Junos IVE OS version 7.4r5 / 8.0r1 or later or UAC OS version 4.4r5 / 5.0r1 or later.

See Also


Plugin Details

Severity: Medium

ID: 76306

File Name: junos_pulse_jsa10628.nasl

Version: $Revision: 1.1 $

Type: local

Family: Misc.

Published: 2014/06/30

Modified: 2014/06/30

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:ive_os, cpe:/o:juniper:unified_access_control_software, cpe:/a:juniper:junos_pulse_secure_access_service, cpe:/a:juniper:junos_pulse_access_control_service

Required KB Items: Host/Juniper/IVE OS/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/09/24

Vulnerability Publication Date: 2014/06/11

Reference Information

CVE: CVE-2014-3812

BID: 68192

OSVDB: 108003