This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Junos device
has a remote code execution vulnerability. When J-Web is enabled,
authenticated users can execute arbitrary commands. This could allow an
unprivileged user (e.g., read only access) to get complete
administrative access. A remote, authenticated attacker could exploit
this to run arbitrary commands with administrative privileges.
See also :
Apply the relevant Junos upgrade referenced in Juniper advisory
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 6.7
Public Exploit Available : false