This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Junos device
is affected by a denial of service vulnerability due to improper
processing by the Enhanced Web Filtering (EWF). An attacker can
exploit this vulnerability by sending a crafted URL to crash the flow
daemon (flowd) process. Repeated crashes of flowd can result in a
sustained denial of service condition for the device.
Note that this issue only affects SRX series devices with EWF enabled.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10622.
Risk factor :
High / CVSS Base Score : 7.1
CVSS Temporal Score : 6.2
Public Exploit Available : true