First published: Wed Apr 13 2016(Updated: )
J-Web does not validate certain input that may lead to cross-site request forgery (CSRF) issues or cause a denial of J-Web service (DoS).
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | =12.1x44 | |
Juniper Junos | =12.1x44-d10 | |
Juniper Junos | =12.1x44-d15 | |
Juniper Junos | =12.1x44-d20 | |
Juniper Junos | =12.1x44-d25 | |
Juniper Junos | =12.1x44-d30 | |
Juniper Junos | =12.1x44-d35 | |
Juniper Junos | =12.1x44-d40 | |
Juniper Junos | =12.1x44-d45 | |
Juniper Junos | =12.1x44-d50 | |
Juniper Junos | =12.1x46 | |
Juniper Junos | =12.1x46-d10 | |
Juniper Junos | =12.1x46-d15 | |
Juniper Junos | =12.1x46-d20 | |
Juniper Junos | =12.1x46-d25 | |
Juniper Junos | =12.1x46-d30 | |
Juniper Junos | =12.1x46-d35 | |
Juniper Junos | =12.1x46-d40 | |
Juniper Junos | =12.1x47 | |
Juniper Junos | =12.1x47-d10 | |
Juniper Junos | =12.1x47-d15 | |
Juniper Junos | =12.1x47-d20 | |
Juniper Junos | =12.1x47-d25 | |
Juniper Junos | =12.3 | |
Juniper Junos | =12.3-r1 | |
Juniper Junos | =12.3-r2 | |
Juniper Junos | =12.3-r3 | |
Juniper Junos | =12.3-r4 | |
Juniper Junos | =12.3-r5 | |
Juniper Junos | =12.3-r6 | |
Juniper Junos | =12.3-r7 | |
Juniper Junos | =12.3-r8 | |
Juniper Junos | =12.3-r9 | |
Juniper Junos | =12.3x48-d10 | |
Juniper Junos | =12.3x48-d15 | |
Juniper Junos | =12.3x48-d25 | |
Juniper Junos | =13.2x51 | |
Juniper Junos | =13.2x51-d15 | |
Juniper Junos | =13.2x51-d20 | |
Juniper Junos | =13.2x51-d21 | |
Juniper Junos | =13.2x51-d25 | |
Juniper Junos | =13.2x51-d26 | |
Juniper Junos | =13.2x51-d30 | |
Juniper Junos | =13.2x51-d35 | |
Juniper Junos | =13.3 | |
Juniper Junos | =13.3-r1 | |
Juniper Junos | =13.3-r2 | |
Juniper Junos | =13.3-r2-s2 | |
Juniper Junos | =13.3-r3 | |
Juniper Junos | =13.3-r4 | |
Juniper Junos | =13.3-r5 | |
Juniper Junos | =13.3-r6 | |
Juniper Junos | =13.3-r7 | |
Juniper Junos | =14.1 | |
Juniper Junos | =14.1-r1 | |
Juniper Junos | =14.1-r2 | |
Juniper Junos | =14.1-r3 | |
Juniper Junos | =14.1-r4 | |
Juniper Junos | =14.1-r5 | |
Juniper Junos | =14.1x53 | |
Juniper Junos | =14.1x53-d10 | |
Juniper Junos | =14.1x53-d15 | |
Juniper Junos | =14.1x53-d16 | |
Juniper Junos | =14.1x53-d25 | |
Juniper Junos | =14.1x53-d26 | |
Juniper Junos | =14.1x53-d27 | |
Juniper Junos | =14.2 | |
Juniper Junos | =14.2-r1 | |
Juniper Junos | =14.2-r2 | |
Juniper Junos | =14.2-r3 | |
Juniper Junos | =14.2-r4 | |
Juniper Junos | =15.1-r1 | |
Juniper Junos | =15.1-r2 | |
Juniper Junos | =15.1x49-d10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1261 is classified as a medium severity vulnerability due to its potential for cross-site request forgery and denial of service.
To fix CVE-2016-1261, update your Juniper Junos software to the latest version as per the vendor's security advisory.
CVE-2016-1261 affects multiple versions of Junos including 12.1x44, 12.1x46, and multiple releases within the 13.x and 14.x series.
CVE-2016-1261 may allow attackers to conduct cross-site request forgery (CSRF) attacks or cause denial of service (DoS) conditions.
Implementing proper input validation and access control can act as temporary mitigations for CVE-2016-1261 until the software is updated.