Lucene search

K
cve[email protected]CVE-2020-1669
HistoryOct 16, 2020 - 9:15 p.m.

CVE-2020-1669

2020-10-1621:15:12
CWE-522
CWE-256
web.nvd.nist.gov
20
juniper
nfx350 series
password hash storage
vulnerability
cybersecurity
nvd
cve-2020-1669

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

6.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

6.2

Confidence

High

EPSS

0

Percentile

12.6%

The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2.

Affected configurations

NVD
Node
junipernfx350Match-
AND
juniperjunosMatch19.4r1
OR
juniperjunosMatch19.4r1-s1
OR
juniperjunosMatch19.4r1-s2
OR
juniperjunosMatch19.4r2
OR
juniperjunosMatch20.1r1
OR
juniperjunosMatch20.1r1-s1
OR
juniperjunosMatch20.1r1-s2
OR
juniperjunosMatch20.1r1-s3
VendorProductVersionCPE
juniperjunos20.1cpe:/o:juniper:junos:20.1:r1-s3::
juniperjunos20.1cpe:/o:juniper:junos:20.1:r1::
juniperjunos19.4cpe:/o:juniper:junos:19.4:r2::
juniperjunos19.4cpe:/o:juniper:junos:19.4:r1-s2::
juniperjunos19.4cpe:/o:juniper:junos:19.4:r1-s1::
juniperjunos19.4cpe:/o:juniper:junos:19.4:r1::
juniperjunos20.1cpe:/o:juniper:junos:20.1:r1-s2::
juniperjunos20.1cpe:/o:juniper:junos:20.1:r1-s1::

CNA Affected

[
  {
    "platforms": [
      "NFX350"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "19.4R3",
        "status": "affected",
        "version": "19.4",
        "versionType": "custom"
      },
      {
        "lessThan": "20.1R1-S4, 20.1R2",
        "status": "affected",
        "version": "20.1",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

6.3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

6.2

Confidence

High

EPSS

0

Percentile

12.6%

Related for CVE-2020-1669