Knowledge Search


2019-10 Security Bulletin: Junos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks during app-id signature updates. (CVE-2019-0054)

  [JSA10952] Show Article Properties

Product Affected:
This issue affects Junos OS 15.1X49. Affected platforms: SRX Series.
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device.

This issue affects:

Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices.

No other versions of Junos OS are affected.

The following minimum configuration is required:

services application-identification

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue was found during internal product security testing or research.

This issue has been assigned CVE-2019-0054.

The following software releases have been updated to resolve this specific issue: 15.1X49-D120, and all subsequent releases.

This issue is being tracked as PR 1291665 which is visible on the Customer Support website.

Note: Juniper SIRT's policy is not to evaluate releases which are beyond End of Engineering (EOE) or End of Life (EOL).


Set the following command in the device for affected releases:

set services application-identification download secure-download
Software Releases, patches and updates are available at
Modification History:
2019-10-09: Initial Publication.
Related Links:
CVSS Score:
6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)
Severity Level:
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."