First published: Sat Dec 19 2015(Updated: )
Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetScreen ScreenOS | =6.3.0-r17 | |
NetScreen ScreenOS | =6.3.0-r18 | |
NetScreen ScreenOS | =6.3.0-r19 | |
NetScreen ScreenOS | =6.3.0-r20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7755 is considered a high severity vulnerability due to its potential for unauthorized remote access.
To fix CVE-2015-7755, upgrade to ScreenOS versions 6.3.0r21 or later, or apply relevant patches provided by Juniper.
CVE-2015-7755 affects Juniper ScreenOS versions 6.2.0r15 through 6.3.0r20, specifically the specified releases.
CVE-2015-7755 is a vulnerability that allows unauthorized remote code execution on affected Juniper devices.
Yes, CVE-2015-7755 has been reported to be actively exploited in the wild, necessitating immediate remediation.