| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Juniper Junos up to 15.1 on SRX300. Affected by this vulnerability is an unknown functionality of the component MACsec. Such manipulation leads to 7pk security. This vulnerability is uniquely identified as CVE-2017-2342. The attack can only be initiated within the local network. No exploit exists. You should upgrade the affected component.
Details
A vulnerability was found in Juniper Junos up to 15.1 on SRX300 (Router Operating System) and classified as problematic. Affected by this issue is some unknown functionality of the component MACsec. The manipulation with an unknown input leads to a 7pk security vulnerability. Using CWE to declare the problem leads to CWE-254. Impacted is confidentiality.
The bug was discovered 07/13/2017. The weakness was disclosed 07/12/2017 as JSA10790 as confirmed security advisory (Website). The advisory is shared for download at kb.juniper.net. This vulnerability is handled as CVE-2017-2342 since 12/01/2016. The attack can only be initiated within the local network. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1211.
The vulnerability scanner Nessus provides a plugin with the ID 102703 (Juniper Junos SRX MACsec Feature Secure Link Failure Silent Fallback Information Disclosure (JSA10790)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Junos Local Security Checks and running in the context c. The commercial vulnerability scanner Qualys is able to test this issue with plugin 43550 (Juniper JUNOS Denial of Service (secure link failure) Vulnerability (JSA10790)).
Upgrading to version 15.1X49-D100 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (102703) and SecurityTracker (ID 1038890†). The entries VDB-103536, VDB-103535, VDB-103534 and VDB-103533 are pretty similar. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.juniper.net/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.2VulDB Meta Temp Score: 6.1
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.1
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: 7pk securityCWE: CWE-254
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 102703
Nessus Name: Juniper Junos SRX MACsec Feature Secure Link Failure Silent Fallback Information Disclosure (JSA10790)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 802738
OpenVAS Name: Junos SRX Series: MACsec Failure Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Junos 15.1X49-D100
Timeline
12/01/2016 🔍07/12/2017 🔍
07/12/2017 🔍
07/13/2017 🔍
07/13/2017 🔍
07/14/2017 🔍
07/17/2017 🔍
08/23/2017 🔍
01/01/2021 🔍
Sources
Vendor: juniper.netAdvisory: JSA10790
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2017-2342 (🔍)
GCVE (CVE): GCVE-0-2017-2342
GCVE (VulDB): GCVE-100-103532
SecurityTracker: 1038890
See also: 🔍
Entry
Created: 07/14/2017 17:15Updated: 01/01/2021 13:19
Changes: 07/14/2017 17:15 (77), 10/25/2019 16:16 (4), 01/01/2021 13:14 (3), 01/01/2021 13:19 (1)
Complete: 🔍
Cache ID: 216:F9A:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.