First published: Tue May 30 2017(Updated: )
A firewall bypass vulnerability in the host based firewall of Juniper Networks Junos Space versions prior to 16.1R1 may permit certain crafted packets, representing a network integrity risk.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2310 is considered a significant network integrity risk due to the potential for firewall bypass.
To mitigate CVE-2017-2310, upgrade to Junos Space versions 16.1R1 or later.
CVE-2017-2310 affects Juniper Networks Junos Space versions prior to 16.1R1.
CVE-2017-2310 can permit certain crafted packets to bypass the host-based firewall, leading to network vulnerability.
There are no documented workarounds for CVE-2017-2310; updating the software is the recommended approach.