9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.7 Medium
AI Score
Confidence
Low
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%
Juniper Networks Junos Space is prone to multiple
vulnerabilities.
# Copyright (C) 2016 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
CPE = "cpe:/a:juniper:junos_space";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.105608");
script_version("2023-11-03T05:05:46+0000");
script_tag(name:"last_modification", value:"2023-11-03 05:05:46 +0000 (Fri, 03 Nov 2023)");
script_tag(name:"creation_date", value:"2016-04-18 12:53:02 +0200 (Mon, 18 Apr 2016)");
script_tag(name:"cvss_base", value:"7.6");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:C/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-09-08 13:00:00 +0000 (Tue, 08 Sep 2020)");
script_cve_id("CVE-2016-1265", "CVE-2015-4748", "CVE-2015-2601", "CVE-2015-2613", "CVE-2015-2659",
"CVE-2015-2808", "CVE-2015-4000", "CVE-2015-4749", "CVE-2015-2625");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Juniper Networks Junos Space Multiple Vulnerabilities (JSA10727)");
script_category(ACT_GATHER_INFO);
script_family("JunOS Local Security Checks");
script_copyright("Copyright (C) 2016 Greenbone Networks GmbH");
script_dependencies("gb_junos_space_version.nasl");
script_mandatory_keys("junos_space/installed");
script_tag(name:"summary", value:"Juniper Networks Junos Space is prone to multiple
vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple vulnerabilities have been addressed in Junos Space 15.2R1.
These include cross site scripting (XSS), default passwords, information leak and command injection vulnerabilities.
These vulnerabilities may potentially allow a remote unauthenticated network based attacker with access to Junos Space
to execute arbitrary code on Junos Space or gain access to devices managed by Junos Space.
These vulnerabilities were found during internal product testing. These issues have been assigned CVE-2016-1265.
Oracle Java runtime was upgraded to 1.7.0 update 85 (from 1.7.0 update 79) which resolves:
- CVE-2015-4748 - Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75
and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
- CVE-2015-2601 - Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75
and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
- CVE-2015-2613 - Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows
remote attackers to affect confidentiality via vectors related to JCE.
- CVE-2015-2659 - Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers
to affect availability via unknown vectors related to Security.
- CVE-2015-2808 - The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state
data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery
attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by
the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the `Bar Mitzvah` issue.
- CVE-2015-4000 - The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client,
does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by
rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the `Logjam` issue.
- CVE-2015-4749 - Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and
8u33 allows remote attackers to affect availability via vectors related to JNDI.
- CVE-2015-2625 - Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and
8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.");
script_tag(name:"affected", value:"Juniper Networks Junos Space versions prior to 15.1R3 and 15.2
prior to 15.2R1.");
script_tag(name:"solution", value:"Update to version 15.1R3, 15.2R1 or later.");
script_xref(name:"URL", value:"http://kb.juniper.net/JSA10727");
exit(0);
}
include("host_details.inc");
include("junos.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE))
exit(0);
if (version =~ "^15\.2")
fix = "15.2R1";
else
fix = "15.1R3";
if (check_js_version(ver: version, fix: fix)) {
report = report_fixed_ver(installed_version: version, fixed_version: fix);
security_message(port: 0, data: report);
exit(0);
}
exit(99);
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.7 Medium
AI Score
Confidence
Low
7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.975 High
EPSS
Percentile
100.0%