How to Buy
This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version, the version of IVE OS running
on the remote host has an insecure SSL configuration. Internal and
development Certificate Authorities (CAs) used by Juniper during testing
were mistakenly included and explicitly trusted in public releases of
IVE OS. A man-in-the-middle attacker could with access to these CAs
could exploit this to compromise the confidentiality and integrity of
SSL connections without being detected.
This plugin determines whether or not the system is vulnerable solely by
check the OS version. It does not check if the workaround in Juniper
Security Advisory JSA10571 is being used.
See also :
Upgrade to IVE OS 7.1r7 or later, or use the workaround listed in
Juniper Security Advisory JSA10571.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.3
Public Exploit Available : true
Nessus Plugin ID: 69183 ()
Bugtraq ID: 60521
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.