This issue affects the SRX Branch Series services gateways running Junos OS 12.1X46-D15 and later releases.
On SRX Series services gateways for the Branch, the 'set system ports console insecure' feature does not work as expected. This feature is intended to prevent non-root users from performing password recovery using the console (see KB22619). This vulnerability may allow a non-root user with physical access to the console port to gain full administrative privileges.
This issue only affects SRX Series services gateways for the Branch, namely SRX100, SRX110, SRX210, SRX220, SRX240, SRX300, SRX320, SRX340, SRX345, SRX550 and SRX650. Other SRX and Junos OS devices are
not affected.
This feature was first introduced in SRX 12.1X46-D15. Earlier releases are unaffected by this vulnerability.
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
No other Juniper Networks products or platforms are affected by this issue.
This issue has been assigned
CVE-2015-3007.
The following software releases have been updated to resolve this specific issue: Junos OS 12.1X46-D35, 12.1X47-D25, 12.3X48-D15, 15.1X49-D80 and all subsequent releases.
This issue is being tracked as PR 1016488 and 1241006, and are visible on the Customer Support website.
KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.
Protect SRX Series services gateways from unauthorized console and/or physical access.
2015-07-08: Initial publication
2017-03-29: Solution section is updated to include Junos OS 15.1X49-D80 and subsequent releases.
2017-04-06: Advisory is updated to clarify that the problem only affects SRX series services gateways for the Branch.
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."