Unrated severityNVD Advisory· Published Oct 5, 2015· Updated May 6, 2026
CVE-2015-7323
CVE-2015-7323
Description
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 allows remote authenticated users to bypass intended access restrictions and log into arbitrary meetings by leveraging a meeting id and meetingAppSun.jar.
Affected products
4cpe:2.3:a:juniper:pulse_connect_secure:7.1:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:juniper:pulse_connect_secure:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:pulse_connect_secure:7.4:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:pulse_connect_secure:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:pulse_connect_secure:8.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- seclists.org/fulldisclosure/2015/Sep/98nvdExploit
- packetstormsecurity.com/files/133711/Junos-Pulse-Secure-Meeting-8.0.5-Access-Bypass.htmlnvdExploit
- profundis-labs.com/advisories/CVE-2015-7323.txtnvdExploit
- kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40054nvdVendor Advisory
- www.securitytracker.com/id/1033684nvd
News mentions
0No linked articles in our index yet.