Rapid7 Vulnerability & Exploit Database

Pulse Secure Pulse Connect Secure: CVE-2014-3812: Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) Weak SSL cipher allowed unexpectedly when higher level cipher group is configured (JSA10628)

Back to Search

Pulse Secure Pulse Connect Secure: CVE-2014-3812: Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) Weak SSL cipher allowed unexpectedly when higher level cipher group is configured (JSA10628)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
06/13/2014
Created
10/28/2020
Added
10/28/2020
Modified
10/28/2020

Description

The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS before 7.4r5 and 8.x before 8.0r1 and Junos Pulse Access Control Service (UAC) before 4.4r5 and 5.x before 5.0r1 enable cipher suites with weak encryption algorithms, which make it easier for remote attackers to obtain sensitive information by sniffing the network.

Solution(s)

  • pulse-secure-pulse-connect-secure-upgrade-7_4r5
  • pulse-secure-pulse-connect-secure-upgrade-8_0r1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;