First published: Fri Jan 08 2016(Updated: )
Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetScreen ScreenOS | <=6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7754 is classified as a critical vulnerability due to its potential to allow remote code execution and denial of service.
To fix CVE-2015-7754, upgrade Juniper ScreenOS to version 6.3.0r21 or later.
CVE-2015-7754 affects Juniper ScreenOS versions prior to 6.3.0r21 with ssh-pka configured and enabled.
Attackers can exploit CVE-2015-7754 to cause a denial of service or execute arbitrary code on the affected system.
There are no official workarounds for CVE-2015-7754; the best course of action is to apply the necessary patch.