Juniper Junos vMX 14.1 < 14.1R8 / 15.1 < 15.1F5 Local Information Disclosure (JSA10766)

medium Nessus Plugin ID 94579

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version number and architecture, the remote Juniper Junos vMX (Virtual MX Series) router is 14.1 prior to 14.1R8 or 15.1 prior to 15.1F5. It is, therefore, affected by a local information disclosure vulnerability due to the use of incorrect permissions. A local attacker can exploit this to disclose sensitive information in vMX or vPFE images, including private cryptographic keys.

Solution

Upgrade to Juniper Junos vMX 14.1R8 / 15.1F5 as referenced in Juniper advisory JSA10766.

See Also

https://kb.juniper.net/JSA10766

Plugin Details

Severity: Medium

ID: 94579

File Name: juniper_jsa10766.nasl

Version: 1.5

Type: combined

Published: 11/4/2016

Updated: 8/10/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Vulnerability Information

CPE: cpe:/o:juniper:junos, cpe:/o:juniper:vmx

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Patch Publication Date: 10/12/2016

Vulnerability Publication Date: 10/12/2016

Reference Information

CVE: CVE-2016-4924

BID: 93531

IAVA: 2016-A-0295

JSA: JSA10766