First published: Tue Jan 20 2004(Updated: )
The default installation of NetScreen-Security Manager before Feature Pack 1 does not enable encryption for communication with devices running ScreenOS 5.0, which allows remote attackers to obtain sensitive information via sniffing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Netscreen Security Manager | ||
Juniper Netscreen Security Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-1766 is considered moderate due to the potential for sensitive information disclosure.
To fix CVE-2004-1766, ensure that encryption for communication is enabled in the default installation of NetScreen-Security Manager.
CVE-2004-1766 affects users of the default installation of NetScreen-Security Manager prior to Feature Pack 1.
CVE-2004-1766 could allow remote attackers to obtain sensitive information transmitted without encryption.
Yes, users should update to Feature Pack 1 or later to mitigate the vulnerability associated with CVE-2004-1766.