CVE-2015-7755
KEV
🔴 Łataj teraz
Obejście uwierzytelnienia w Juniper ScreenOS umożliwia zdalny dostęp administracyjny.
CVSS
9.8
EPSS
85.2%
Exploit
weaponized
Vendor
juniper
Opis źródłowy (NVD)
Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 85.2% |
| Opublikowano (NVD) | 2015-12-19 14:59:01 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 16:27:21 UTC |
Referencje
- http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic/ (cve@mitre.org) [Third Party Advisory]
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713 (cve@mitre.org) [Exploit, Vendor Advisory]
- http://twitter.com/cryptoron/statuses/677900647560253442 (cve@mitre.org) [Broken Link]
- http://www.forbes.com/sites/thomasbrewster/2015/12/18/juniper-says-it-didnt-work-with-government-to-add-unauthorized-code-to-network-gear/ (cve@mitre.org) [Permissions Required]
- http://www.kb.cert.org/vuls/id/640184 (cve@mitre.org) [Third Party Advisory]
- http://www.securityfocus.com/bid/79626 (cve@mitre.org) [Broken Link]
- http://www.securitytracker.com/id/1034489 (cve@mitre.org) [Broken Link]
- http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors/ (cve@mitre.org) [Third Party Advisory]
- https://adamcaudill.com/2015/12/17/much-ado-about-juniper/ (cve@mitre.org) [Third Party Advisory]
- https://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554 (cve@mitre.org) [Vendor Advisory]
- https://github.com/hdm/juniper-cve-2015-7755 (cve@mitre.org) [Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-7755 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]