ID:44 - Exploit for Authentication bypass in Juniper ScreenOS - CVE-2015-7755

 
Main Vulnerability Database Exploits ID:44 - Exploit for Authentication bypass in Juniper ScreenOS - CVE-2015-7755

ID:44 - Exploit for Authentication bypass in Juniper ScreenOS - CVE-2015-7755

Published: March 18, 2020


Vulnerability identifier: #VU5587
Vulnerability risk: Critical
CVE-ID: CVE-2015-7755
CWE-ID: CWE-287
Exploitation vector: Remote access
Vulnerable software:
Juniper ScreenOS

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to bypass authentication on the target system.

The weakness exists due to presence of backdoor in Juniper ScreenOS code. A remote attacker can enter a password "<<< %s(un='%s') = %u" during a SSH or TELNET session and obtain administrative access to the device.

Successful exploitation of the vulnerability results in unauthorized access to the vulnerable system.

Note: the vulnerability was being actively exploited.

Remediation

Install update from vendor's website.