Refer to Problem section below.On March 1, 2016, a cross-protocol attack was announced by OpenSSL that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP) shares the RSA keys of the non-vulnerable server.

This vulnerability is known as DROWN (CVE-2016-0800).SSLv2 is a very old security protocol with known issues, but still exists as a fallback protocol on many devices.Vulnerable Products
WLC Wireless LAN Controller
Products Not Vulnerable
Junos OS
Junos Space
QFabric Director
Standalone IDP
NSM (server and NSM4000, NSM3000, NSMXpress appliance)
WLAN RingMaster
WLAN SmartPass
Juniper is continuing to investigate our product portfolio for affected software that is not mentioned above.

As new information becomes available this document will be updated.This issue has been assigned CVE-2016-0800.ScreenOS:Starting with ScreenOS 6.3.0r19, SSLv2 and SSLv3 can both be manually disabled via the ‘unset ssl ssl3’ CLI command.STRM/JSA Series:Fixes will be available in STRM versions 2014.6.r4 and 2013.2.r14.Solutions for other vulnerable products will be added as they become available.Follow security best current practices by limiting the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to networking devices via SSL only from trusted, administrative networks or hosts.Alternately, use a firewall filter to block all incoming SSLv2 traffic.Modification History:
2016-03-14: Initial publication
Information for how Juniper Networks uses CVSS can be found at KB 16446 “Common Vulnerability Scoring System (CVSS) and Juniper’s Security Advisories.”