""ET EXPLOIT Juniper ScreenOS telnet Backdoor Default Password Attempt""

SID: 2022291

Revision: 1

Class Type: attempted-admin

Metadata: created_at 2015_12_21, cve CVE_2015_7755, updated_at 2015_12_21

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: 23

Flow: established,to_server

Contents:

  • Value: "|3c 3c 3c 20 25 73 28 75 6e 3d 27 25 73 27 29 20 3d 20 25 75|"

Within:

PCRE:

Special Options:

  • fast_pattern

source