Juniper Junos OS Improper Certificate Validation (JSA11264)

high Nessus Plugin ID 159063


The remote device is missing a vendor-supplied security patch.


The version of Junos OS installed on the remote host is affected by a vulnerability as referenced in the JSA11264 advisory. An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an attacker to perform Person-in-the-Middle (PitM) attacks when a system script is fetched from a remote source at a specified HTTPS URL, which may compromise the integrity and confidentiality of the device.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Apply the relevant Junos software release referenced in Juniper advisory JSA11264

See Also

Plugin Details

Severity: High

ID: 159063

File Name: juniper_jsa11264.nasl

Version: 1.5

Type: combined

Published: 3/18/2022

Updated: 3/22/2022

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-22156


Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*

Required KB Items: Host/Juniper/JUNOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 1/12/2022

Vulnerability Publication Date: 1/12/2022

Reference Information

CVE: CVE-2022-22156

IAVA: 2022-A-0028

JSA: JSA11264