SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionThe version of tested product installed on the remote host is prior to tested version. It is, therefore, affected by a stack based overflow vulnerability in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series. A remote attacker can exploit it which can lead to a remote code execution as referenced in the JSA10930 advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionApply the relevant Junos software release referenced in Juniper advisory JSA10930