Juniper Junos vMX 14.1 < 14.1R8 / 15.1 < 15.1F5 Local Information Disclosure (JSA10766)

medium Nessus Plugin ID 94579

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version number and architecture, the remote Juniper Junos vMX (Virtual MX Series) router is 14.1 prior to 14.1R8 or 15.1 prior to 15.1F5. It is, therefore, affected by a local information disclosure vulnerability due to the use of incorrect permissions. A local attacker can exploit this to disclose sensitive information in vMX or vPFE images, including private cryptographic keys.

Solution

Upgrade to Juniper Junos vMX 14.1R8 / 15.1F5 as referenced in Juniper advisory JSA10766.

See Also

https://kb.juniper.net/JSA10766

Plugin Details

Severity: Medium

ID: 94579

File Name: juniper_jsa10766.nasl

Version: 1.6

Type: combined

Published: 11/4/2016

Updated: 1/20/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 1.7

Temporal Score: 1.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2016-4924

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:vmx, cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/12/2016

Vulnerability Publication Date: 10/12/2016

Reference Information

CVE: CVE-2016-4924

BID: 93531

IAVA: 2016-A-0295

JSA: JSA10766