⚠ Actively exploited
Added to CISA KEV on 2025-10-02. Federal agencies required to patch by 2025-10-23. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..

CVE-2015-7755

Severity
9.8CRITICAL
EPSS
85.0%
top 0.65%
CISA KEV
KEV
Added 2025-10-02
Due 2025-10-23
Exploit
No known exploits
Affected products
Timeline
PublishedDec 19
KEV addedOct 2
KEV dueOct 23
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDjuniper/screenos6.3.0

🔴Vulnerability Details

3
GHSA
GHSA-43vr-5w6h-pr3g: Juniper ScreenOS 62022-05-17
CVEList
CVE-2015-7755: Juniper ScreenOS 62015-12-19
VulnCheck
Juniper ScreenOS Improper Authentication Vulnerability2015

🔍Detection Rules

2
Suricata
ET INFO FOX-SRT - Juniper ScreenOS SSH World Reachable2015-12-22
Suricata
ET EXPLOIT Juniper ScreenOS telnet Backdoor Default Password Attempt2015-12-21

📋Vendor Advisories

2
CISA
Juniper ScreenOS Improper Authentication Vulnerability2025-10-02
Juniper
CVE-2015-7755: Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b2015-12-19
CVE-2015-7755 (CRITICAL CVSS 9.8) | Juniper ScreenOS 6.2.0r15 through 6 | cvebase.io