This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device is affected by a denial of service vulnerability in the
Juniper PPP daemon (jpppd). A remote attacker can exploit this issue
by sending a specially crafted PAP Authenticate-Request after
successful negotiation of the PPPoE Discovery and LCP phase, resulting
in the PPP daemon crashing.
Note that this issue only affects MX series routers deployed as a
broadband edge (BBE) router.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10665.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : false