First published: Fri Oct 13 2017(Updated: )
A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. All versions of Juniper Networks Junos Space prior to 15.1R3 are affected.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=15.1r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1265 is rated as a critical vulnerability due to the potential for remote code execution and unauthorized access.
To mitigate CVE-2016-1265, it is recommended to update Junos Space to a version higher than 15.1r2 and change default credentials.
CVE-2016-1265 can be exploited through remote unauthenticated network attacks utilizing CSRF, command injection, and information leakage.
CVE-2016-1265 affects all versions of Junos Space up to and including 15.1r2.
No, CVE-2016-1265 can be exploited by unauthorized attackers without needing authentication.