Executive Summary
Summary | |
---|---|
Title | Juniper ScreenOS contains multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#640184 | First vendor Publication | 2015-12-21 |
Vendor | VU-CERT | Last vendor Modification | 2015-12-22 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#640184Juniper ScreenOS contains multiple vulnerabilitiesOverviewJuniper Networks ScreenOS versions 6.3.0r17 through 6.3.0r20 allows unauthorized remote administration access to the device. Juniper Networks ScreenOS versions 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20 allow for an attacker to monitor and decrypt VPN traffic. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to the Juniper SIRT Team. This document was written by Brian Gardiner. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/640184 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-310 | Cryptographic Issues |
50 % | CWE-287 | Improper Authentication |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Juniper ScreenOS unauthorized backdoor access attempt RuleID : 37146 - Revision : 4 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-12-23 | Name : An account on the remote host uses a known password. File : screenos_ssh_auth_bypass.nasl - Type : ACT_GATHER_INFO |
2015-12-18 | Name : The remote host is affected by multiple vulnerabilities. File : screenos_JSA10713.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-12-24 13:25:54 |
|
2015-12-23 00:22:48 |
|
2015-12-22 21:23:16 |
|
2015-12-22 00:23:07 |
|