TROJAN: Juniper ScreenOS Telnet Backdoor Password Attempt

This signature detects unauthorized remote administrative access attempts to netscreen firewalls running ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20. Exploitation of this vulnerability can lead to complete compromise of the affected device.

Extended Description

Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.

Affected Products

Juniper screenos

Short Name
TROJAN:BACKDOOR:SCREENOS-PWD
Severity
Minor
Recommended
True
Recommended Action
None
Category
TROJAN
Keywords
Attempt Backdoor CVE-2015-7755 Juniper Password ScreenOS Telnet
Release Date
12/21/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Juniper

CVSS Score

10.0

Found a potential security threat?