This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device has a flaw in its OSPF implementation. A rogue router in
the same autonomous system (AS) could exploit this to control the
routing tables of all other routers in the AS.
Note that this issue does not affect device with one of the following
- Interfaces not configured for OSPF
- Passive OSPF interfaces
- OSPF configurations that use MD5 authentication
- OSPF interfaces that block external parties from sending
OSPF link-state update packets
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10582.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true