First published: Fri Oct 13 2017(Updated: )
An authentication bypass vulnerability in Juniper Networks Junos Space Network Management Platform may allow a remote unauthenticated network based attacker to login as any privileged user. This issue only affects Junos Space Network Management Platform 17.1R1 without Patch v1 and 16.1 releases prior to 16.1R3. This issue was found by an external security researcher.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | =17.1-r1 | |
Juniper Networks Junos Space | =16.1 | |
Juniper Networks Junos Space | =16.1-r1 | |
Juniper Networks Junos Space | =16.1-r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10622 has been classified as a high severity vulnerability due to the potential for remote authentication bypass.
To fix CVE-2017-10622, apply Patch v1 for Junos Space Network Management Platform version 17.1R1 and ensure that all other affected versions are updated accordingly.
CVE-2017-10622 affects users of Junos Space Network Management Platform versions 17.1R1 without Patch v1, as well as all 16.1 releases prior to the appropriate patch.
CVE-2017-10622 can be exploited by remote unauthenticated network-based attackers to gain unauthorized access as a privileged user.
Yes, CVE-2017-10622 allows attackers to bypass authentication and log in as any privileged user without needing credentials.