Files
CVEs-PoC/2015/CVE-2015-5369.md
T
2024-05-26 14:27:05 +02:00

18 lines
899 B
Markdown

### [CVE-2015-5369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5369)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Pulse Connect Secure (aka PCS and formerly Juniper PCS) PSC6000, PCS6500, and MAG PSC360 8.1 before 8.1r5, 8.0 before 8.0r13, 7.4 before 7.4r13.5, and 7.1 before 7.1r22.2 and PPS 5.1 before 5.1R5 and 5.0 before 5.0R13, when Hardware Acceleration is enabled, does not properly validate the Finished TLS handshake message, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted Finished message.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/withdk/pulse-secure-vpn-mitm-research