Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2016-2364 | A remote unauthenticated network based attacker with access to Junos Space may execute arbitrary code on Junos Space or gain access to devices managed by Junos Space using cross site request forgery (CSRF), default authentication credentials, information leak and command injection attack vectors. All versions of Juniper Networks Junos Space prior to 15.1R3 are affected. |
Solution
No solution given by the vendor.
Workaround
Limit access to Junos Space from only trusted networks Use administrative jump boxes with no internet access and employ anti-scripting techniques. In addition to the recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the devices administrative interfaces only from trusted, administrative networks or hosts.
Link | Providers |
---|---|
https://kb.juniper.net/JSA10727 |
![]() ![]() |
Tue, 17 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Junos Space: privilege escalation vulnerabilities in Junos Space | Junos Space: privilege escalation vulnerabilities in Junos Space |

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T02:20:41.614Z
Reserved: 2015-12-30T00:00:00
Link: CVE-2016-1265

No data.

Status : Deferred
Published: 2017-10-13T17:29:00.223
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-1265

No data.

No data.