Juniper Junos host-inbound-traffic Implicit Allow (PSN-2012-07-653)

Medium Nessus Plugin ID 59997


The remote device does not properly enforce access control rules.


According to its self-reported version number, the remote Junos device allows inbound SSH traffic even when 'host-inbound-traffic' is not explicitly configured to allow it.


Apply the relevant Junos upgrade referenced in Juniper advisory PSN-2012-07-653.

See Also

Plugin Details

Severity: Medium

ID: 59997

File Name: juniper_psn-2012-07-653.nasl

Version: $Revision: 1.7 $

Type: combined

Published: 2012/07/17

Modified: 2015/09/08

Dependencies: 55932

Risk Information

Risk Factor: Medium


Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/07/10

Vulnerability Publication Date: 2012/07/10

Reference Information

OSVDB: 85334