Vulnerability Description
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 provides different messages for attempts to join a meeting depending on the status of the meeting, which allows remote attackers to enumerate valid meeting ids via a series of requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Pulse Connect Secure | 7.1 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1033685
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40053Vendor Advisory
- https://profundis-labs.com/advisories/CVE-2015-7322.txtExploit
- http://www.securitytracker.com/id/1033685
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40053Vendor Advisory
- https://profundis-labs.com/advisories/CVE-2015-7322.txtExploit
FAQ
What is CVE-2015-7322?
CVE-2015-7322 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 provides different messages for attempts t...
How severe is CVE-2015-7322?
CVE-2015-7322 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7322?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Pulse Connect Secure.