This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos SRX series device is affected by a denial of service
vulnerability in the flow daemon (flowd) when handling certain valid
HTTP protocol messages. A remote attacker can exploit this to crash
Note that this issue only affects devices configured as a Unified
Access Control (UAC) enforcer in a UAC network with Captive Portal
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10611.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : false