CWE
20
Advisory Published
Updated

CVE-2017-10615: Input Validation

First published: Fri Oct 13 2017(Updated: )

A vulnerability in the pluggable authentication module (PAM) of Juniper Networks Junos OS may allow an unauthenticated network based attacker to potentially execute arbitrary code or crash daemons such as telnetd or sshd that make use of PAM. Affected Juniper Networks Junos OS releases are: 14.1 from 14.1R5 prior to 14.1R8-S4, 14.1R9; 14.1X53 prior to 14.1X53-D50 on EX and QFX series; 14.2 from 14.2R3 prior to 14.2R7-S8, 14.2R8; No other Junos OS releases are affected by this issue. No other Juniper Networks products are affected by this issue.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=14.1
Junos OS Evolved=14.1-r1
Junos OS Evolved=14.1-r2
Junos OS Evolved=14.1-r3
Junos OS Evolved=14.1-r4
Junos OS Evolved=14.1-r5
Junos OS Evolved=14.1-r6
Junos OS Evolved=14.1-r7
Junos OS Evolved=14.1-r9
Junos OS Evolved=14.1x53
Junos OS Evolved=14.1x53-d10
Junos OS Evolved=14.1x53-d15
Junos OS Evolved=14.1x53-d16
Junos OS Evolved=14.1x53-d25
Junos OS Evolved=14.1x53-d26
Junos OS Evolved=14.1x53-d27
Junos OS Evolved=14.1x53-d30
Junos OS Evolved=14.1x53-d35
Junos OS Evolved=14.1x53-d40
Junos OS Evolved=14.1x53-d45
Juniper EX3200
Juniper EX3300-VX
Juniper EX3300-VX
Juniper EX Series
Juniper EX4200
Juniper EX4300-24T
Juniper EX4300
juniper ex4500-vc
Juniper EX4500
Juniper EX Series
Juniper EX4550
Juniper EX4600
Juniper EX4600
Juniper EX6200
Juniper EX Series
Juniper EX8200
Junos OS Evolved=14.2
Junos OS Evolved=14.2-r1
Junos OS Evolved=14.2-r2
Junos OS Evolved=14.2-r3
Junos OS Evolved=14.2-r4
Junos OS Evolved=14.2-r5
Junos OS Evolved=14.2-r6
Junos OS Evolved=14.2-r7
Junos OS Evolved=14.2-r8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2017-10615?

    CVE-2017-10615 has a severity rating that indicates potential remote code execution or denial of service.

  • How do I fix CVE-2017-10615?

    To mitigate CVE-2017-10615, upgrade to an unaffected version of Junos OS that addresses this vulnerability.

  • Which versions of Junos OS are affected by CVE-2017-10615?

    CVE-2017-10615 affects Junos OS versions 14.1 and 14.2, including specific maintenance releases.

  • Can CVE-2017-10615 allow unauthenticated access?

    Yes, CVE-2017-10615 may allow an unauthenticated network-based attacker to exploit the vulnerability.

  • What impact can CVE-2017-10615 have on my network?

    CVE-2017-10615 can potentially lead to arbitrary code execution or crash critical daemons in Junos OS.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203