Juniper Security Bulletin - Junos Pulse Secure Access Service and Access Control Service
Date: 17 September 2014
The purpose of this advisory is to bring attention to a Software security update for Juniper's SSL VPN/UAC products.
A cross site scripting issue has been found in the Juniper Networks SSL VPN/UAC products. Successful exploit of this vulnerability could allow an attacker to dynamically create arbitrary active content which could be rendered in the user's browser, leading to possible session theft, service disruption, or other information disclosure. The problem is a result of incorrect user input validation on the SSL VPN/UAC web server. The issue exists within a web page that is only accessible by an authenticated administrator session.
The issue is fixed in SA/MAG (IVE OS) releases: 8.0r1, 7.4r3, and 7.1r16, and all subsequent releases. UAC OS: 5.0r1, 4.4r3, and 4.1r8, and all subsequent releases.
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
Juniper Security Bulletin
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: