First published: Fri Oct 13 2017(Updated: )
Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10623 has been classified as a high severity vulnerability due to the potential for unauthorized access and disruption of cluster operations.
To mitigate CVE-2017-10623, users should upgrade to Junos Space version 16.2 or later to ensure proper authentication and authorization of cluster messages.
CVE-2017-10623 affects all versions of Juniper Networks Junos Space up to and including version 16.2.
CVE-2017-10623 allows attackers to perform man-in-the-middle attacks by intercepting, injecting, or disrupting cluster operations.
There are no known workarounds for CVE-2017-10623; the recommended approach is to upgrade the vulnerable software.