Juniper Networks, Inc. Information for VU#878044
SNMPv3 improper HMAC validation allows authentication bypass
- Vendor Information Help Date Notified: 20 May 2008
- Statement Date:
- Date Updated: 09 Jun 2008
Juniper Networks has confirmed that its Session and Resource Control appliances are susceptible to this vulnerability. Customers run SRC versions 1.0.0, 1.0.1, or 2.0.0 on their C-series appliances are encouraged to contact the Juniper Networks Customer Support Center for more detailed information and for product updates.
All other Juniper Networks products are NOT susceptible to this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.