Juniper ScreenOS 6.2.x < 6.2.0r19 / 6.3.x < 6.3.0r21 Multiple Vulnerabilities (JSA10713)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple vulnerabilities.

Description :

The remote host is running a version of Juniper ScreenOS that is 6.2.x
prior to 6.2.0r19 or 6.3.x prior to 6.3.0r21. It is, therefore,
affected by multiple vulnerabilities :

- A backdoor exists that allows a remote attacker
administrative access to the device over SSH or telnet.
(CVE-2015-7755)

- An unspecified flaw exists that allows a
man-in-the-middle attacker to decrypt VPN traffic.
(CVE-2015-7756)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713

Solution :

Upgrade to Juniper ScreenOS 6.2.0r19 / 6.3.0r21 or later.
Alternatively, apply the appropriate patch referenced in the vendor
advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 87507 ()

Bugtraq ID: 79626

CVE ID: CVE-2015-7755
CVE-2015-7756

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now