CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-10604 Juniper JUNOS Denial of Service (account lock out) Vulnerability (JSA10806)

2017年8月19日 968点热度 0人点赞 0条评论

漏洞类别:Hardware

漏洞等级:

漏洞信息

Juniper JUNOS is the network operating system used in Juniper Networks hardware systems.

When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out.

Affected Versions:
Junos OS 12.1X46 prior to 12.1X46-D65 on SRX series;
12.3X48 prior to 12.3X48-D45 on SRX series;
15.1X49 prior to 15.1X49-D75 on SRX series

漏洞危害

When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out.

解决方案

The following software releases have been updated to resolve this specific issue: 12.1X46-D65, 12.3X48-D45, 15.1X49-D75, and all subsequent releases.

Workaround:
Administrators may block the offending SSH traffic from an upstream device.
Use access lists or firewall filters to limit access to the device only from trusted administrative hosts, networks and users.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

JSA10806: junos

0daybank

标签: 暂无
最后更新:2017年8月19日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me