This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device is affected by a low entropy vulnerability due to an
insufficient number of bytes being collected from the RANDOM_INTERRUPT
entropy source when the device is first booted, thus resulting in the
generation of weak SSH keys or SSL/TLS certificates.
See also :
Apply the relevant Junos software release referenced in Juniper
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true