Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110;
Published 2017-10-13 17:29:01
Updated 2019-10-09 23:21:42
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2017-10620

0.08%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2017-10620

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
5.8
MEDIUM AV:N/AC:M/Au:N/C:N/I:P/A:P
8.6
4.9
NIST
7.4
HIGH CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
2.2
5.2
NIST
7.4
HIGH CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
2.2
5.2
Juniper Networks, Inc.

CWE ids for CVE-2017-10620

References for CVE-2017-10620

  • https://kb.juniper.net/JSA10822
    Juniper Networks - 2017-10 Security Bulletin: SRX Series: Antivirus updates are downloaded without verification (CVE-2017-10620)
    Vendor Advisory

Products affected by CVE-2017-10620

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!