CWE
310
Advisory Published
Updated

CVE-2015-7756

First published: Sat Dec 19 2015(Updated: )

The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 makes it easier for remote attackers to discover the plaintext content of VPN sessions by sniffing the network for ciphertext data and conducting an unspecified decryption attack.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Juniper ScreenOS=6.2.0r15
Juniper ScreenOS=6.2.0r16
Juniper ScreenOS=6.2.0r17
Juniper ScreenOS=6.2.0r18
Juniper ScreenOS=6.3.0-r12
Juniper ScreenOS=6.3.0-r14
Juniper ScreenOS=6.3.0-r15
Juniper ScreenOS=6.3.0-r16
Juniper ScreenOS=6.3.0-r17
Juniper ScreenOS=6.3.0-r18
Juniper ScreenOS=6.3.0-r19
Juniper ScreenOS=6.3.0-r20

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203