CVE-2015-7755

9.8 CRITICAL CISA KEV - Actively Exploited
Published: December 19, 2015 Modified: October 22, 2025

Description

Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713
Source: cve@mitre.org
Exploit Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://twitter.com/cryptoron/statuses/677900647560253442
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/640184
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/79626
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id/1034489
Source: af854a3a-2127-422b-91ae-364da2661108
https://adamcaudill.com/2015/12/17/much-ado-about-juniper/
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/hdm/juniper-cve-2015-7755
Source: af854a3a-2127-422b-91ae-364da2661108

23 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
88.7%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2025-10-23

Weaknesses (CWE)

Affected Vendors

juniper