Juniper Junos Pulse Client Privilege Escalation (JSA10644)

High Nessus Plugin ID 77688


The remote host has a VPN Client installed that is affected by a privilege escalation vulnerability.


According to its self-reported version, the installation of Junos Pulse Client on the remote Windows host is version 4.0 prior to 4.0r6 or a version prior to 3.1r8. It is, therefore, affected by a privilege escalation vulnerability that allows a local attacker to gain administrative privileges via unspecified vectors.


Upgrade to Junos Pulse Client 7.4r6 or later

See Also

Plugin Details

Severity: High

ID: 77688

File Name: junos_pulse_client_jsa10644.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2014/09/15

Modified: 2017/05/16

Dependencies: 77686

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:juniper:junos_pulse_client

Required KB Items: SMB/Registry/Enumerated, installed_sw/Juniper Junos Pulse Client

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/09/10

Vulnerability Publication Date: 2014/09/10

Reference Information

CVE: CVE-2014-3811

BID: 69797

IAVA: 2014-A-0138