Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110;
Advisories
Source ID Title
EUVD EUVD EUVD-2017-2267 Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110;
Fixes

Solution

No solution given by the vendor.


Workaround

There are no viable workarounds for this issue. It is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device from trusted, administrative networks or hosts.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T22:15:01.262Z

Reserved: 2017-06-28T00:00:00

Link: CVE-2017-10620

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-13T17:29:00.940

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-10620

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.