CVE-2015-7755
Published Dec 19, 2015
Last updated 4 months ago
- Description
- Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.
- Source
- cve@mitre.org
- NVD status
- Deferred
- Products
- screenos
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Data from CISA
- Vulnerability name
- Juniper ScreenOS Improper Authentication Vulnerability
- Exploit added on
- Oct 2, 2025
- Exploit action due
- Oct 23, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*",
"matchCriteriaId": "9323A380-A99C-4B35-B379-51A57CF17678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*",
"matchCriteriaId": "5B6F2143-1B00-4F3D-9454-24A80D9C88FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*",
"matchCriteriaId": "29AF89BB-010B-4E95-8E80-69749BDF4211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*",
"matchCriteriaId": "1D1377D2-A31B-4081-890F-8955D86E50C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]