NTA Monitor has reported a weakness in Juniper Netscreen VPN, which can be exploited by malicious people to gain knowledge of certain information.
The weakness is caused due to the device returning different responses depending on whether or not a valid username is supplied. This can be exploited to enumerate valid usernames, which can be used to obtain password hashes.
Successful exploitation requires that the device is configured to use IKE aggressive mode with pre-shared key authentication.
The weakness has been reported in ScreenOS software versions up to 5.2.0.
Solution: See vendor advisory for workarounds.
Provided and/or discovered by: NTA Monitor
Original Advisory: Juniper Networks:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com