Juniper Junos J-Web Remote Code Execution (PSN-2013-04-914)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote device is missing a vendor-supplied security patch.

Description :

According to its self-reported version number, the remote Junos device
has a remote code execution vulnerability. When J-Web is enabled,
authenticated users can execute arbitrary commands. This could allow an
unprivileged user (e.g., read only access) to get complete
administrative access. A remote, authenticated attacker could exploit
this to run arbitrary commands with administrative privileges.

See also :

Solution :

Apply the relevant Junos upgrade referenced in Juniper advisory

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 6.7
Public Exploit Available : false

Family: Junos Local Security Checks

Nessus Plugin ID: 66512 ()

Bugtraq ID: 60013


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now