Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110;
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10822 | Vendor Advisory |
https://kb.juniper.net/JSA10822 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 03:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA10822 - Vendor Advisory |
Information
Published : 2017-10-13 17:29
Updated : 2024-11-21 03:06
NVD link : CVE-2017-10620
Mitre link : CVE-2017-10620
CVE.ORG link : CVE-2017-10620
JSON object : View
Products Affected
juniper
- srx3600
- srx1400
- srx210
- srx650
- srx110
- srx550
- junos
- srx4100
- srx340
- srx1500
- srx3400
- srx345
- srx5400
- srx320
- srx100
- srx300
- srx240
- srx220
- srx5800
- srx5600
- srx4200
CWE
CWE-295
Improper Certificate Validation