Juniper Junos QFX Low Entropy Vulnerability (JSA10678)

Medium Nessus Plugin ID 82798


The remote device is missing a vendor-supplied security patch.


According to its self-reported version number, the remote Juniper Junos device is affected by a low entropy vulnerability due to an insufficient number of bytes being collected from the RANDOM_INTERRUPT entropy source when the device is first booted, thus resulting in the generation of weak SSH keys or SSL/TLS certificates.


Apply the relevant Junos software release referenced in Juniper advisory JSA10678.

See Also

Plugin Details

Severity: Medium

ID: 82798

File Name: juniper_jsa10678.nasl

Version: $Revision: 1.7 $

Type: combined

Published: 2015/04/15

Modified: 2017/05/16

Dependencies: 55932

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version, Host/Juniper/model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/04/08

Vulnerability Publication Date: 2015/04/08

Reference Information

CVE: CVE-2015-3006

BID: 74020

OSVDB: 120483

JSA: JSA10678