First published: Fri Apr 15 2016(Updated: )
The administrative web services interface in Juniper ScreenOS before 6.3.0r21 allows remote attackers to cause a denial of service (reboot) via a crafted SSL packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetScreen ScreenOS | =6.3.0-r19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1268 is considered a high severity vulnerability due to the potential for remote attackers to remotely reboot affected systems.
To fix CVE-2016-1268, upgrade your Juniper ScreenOS to version 6.3.0r21 or later.
CVE-2016-1268 allows for a denial of service (DoS) attack via crafted SSL packets.
CVE-2016-1268 affects Juniper ScreenOS versions before 6.3.0r21, including 6.3.0r19.
There are no effective workarounds for CVE-2016-1268; the only way to mitigate the vulnerability is to upgrade to the patched version.