First published: Fri Oct 13 2017(Updated: )
Insufficient verification of node certificates in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to make unauthorized modifications to Space database or add nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10624 has a high severity rating due to the potential for unauthorized modifications and man-in-the-middle attacks.
To fix CVE-2017-10624, upgrade to Juniper Networks Junos Space version 17.1R1 or later.
CVE-2017-10624 could be exploited by an attacker to perform man-in-the-middle attacks or make unauthorized changes to the Space database.
All versions of Juniper Networks Junos Space prior to 17.1R1 are affected by CVE-2017-10624.
The main issue caused by CVE-2017-10624 is insufficient verification of node certificates, which compromises the integrity of the system.