BDU:2015-12233

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Уязвимость операционной системы ScreenOS связана с недостатками процедуры аутентификации. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, получить права администратора в результате ввода специально сформированного пароля при подключении к устройству по протоколам SSH или TELNET

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

bdu

Related Vulnerabilities

Exploits

Exploit ID: BDU:2015-12233

Source: bdu_exploit

URL: https://bdu.fstec.ru/vul

Recommendations

Source: bdu

Установка обновления, доступного на сайте производителя: http://www.juniper.net/support/downloads/screenos.html

URL: https://bdu.fstec.ru/vul/2015-12233

Vulnerable Software (10)

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r14b",  "version_start_including": "6.3.0r14"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r16b",  "version_start_including": "6.3.0r16"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r19b",  "version_start_including": "6.3.0r19"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r21",  "version_start_including": "6.3.0r20"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_including": "6.2.0r18",  "version_start_including": "6.2.0r15"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r12b",  "version_start_including": "6.3.0r12"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r13b",  "version_start_including": "6.3.0r13"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r15b",  "version_start_including": "6.3.0r15"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r17b",  "version_start_including": "6.3.0r17"}

Source: bdu

Type: Configuration

Vendor: juniper networks inc.

Product: screenos

Operating System: * *

Trait:
{  "version_end_excluding": "6.3.0r18b",  "version_start_including": "6.3.0r18"}

Source: bdu

End of list