This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version number, the remote Juniper
Junos device is affected by a denial of service vulnerability in sendd
due to improper handling of IPv6 Secure Neighbor Discovery (SEND)
Protocol packets when the Secure Neighbor Discovery feature is
configured. A remote attacker, using a crafted SEND packet, can
exploit this to cause excessive consumption of CPU resources,
resulting in an impact on CLI responsiveness and the processing of
IPv6 packets via link-local addresses.
See also :
Apply the relevant Junos software release or workaround referenced in
Juniper advisory JSA10688.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true