First published: Fri Feb 28 2020(Updated: )
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.2x50-d10 | |
Juniper JUNOS | =12.2x50-d20 | |
Juniper JUNOS | =12.2x50-d41.1 | |
Juniper JUNOS | =12.2x50-d42.1 | |
Juniper JUNOS | =12.2x50-d56.1 | |
Juniper JUNOS | =13.1x50-d10 | |
Juniper JUNOS | =13.1x50-d25 | |
Juniper JUNOS | =13.2x51-d15 | |
Juniper JUNOS | =13.2x51-d20 | |
Juniper JUNOS | =13.2x51-d20.2 | |
Juniper JUNOS | =13.2x51-d21 | |
Juniper JUNOS | =13.2x52-d10 | |
Juniper JUNOS | =13.2x52-d5 | |
Juniper JUNOS | =14.1x53 | |
Juniper Qfx3500 | ||
Juniper Qfx3600 |
The following software releases have been updated to resolve this specific issue: Junos OS 12.2X50-D70 13.1X50-D30 13.2X51-D25 13.2X51-D30 13.2X52-D15 14.1X53-D10, and all subsequent releases. It is recommended to regenerate SSH keys or self signed certificates.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3006 is a vulnerability found on the QFX3500 and QFX3600 platforms that leads to weak or duplicate SSH keys or self-signed SSL/TLS certificates due to insufficient entropy.
CVE-2015-3006 affects the QFX3500 and QFX3600 platforms.
CVE-2015-3006 can result in the generation of weak or duplicate SSH keys or self-signed SSL/TLS certificates.
CVE-2015-3006 has a severity rating of 6.5, considered medium.
More information about CVE-2015-3006 can be found at the Juniper Networks Knowledge Base: https://kb.juniper.net/JSA10678