Vulnerabilities > CVE-2015-3006 - Insufficient Entropy vulnerability in Juniper Junos
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 14 | |
Hardware | 2 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
Nessus
NASL family | Junos Local Security Checks |
NASL id | JUNIPER_JSA10678.NASL |
description | According to its self-reported version number, the remote Juniper Junos device is affected by a low entropy vulnerability due to an insufficient number of bytes being collected from the RANDOM_INTERRUPT entropy source when the device is first booted, thus resulting in the generation of weak SSH keys or SSL/TLS certificates. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 82798 |
published | 2015-04-15 |
reporter | This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/82798 |
title | Juniper Junos QFX Low Entropy Vulnerability (JSA10678) |
code |
|