CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
32.4%
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.4 | cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.1 | cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:* |
[
{
"product": "Junos OS Evolved",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "20.4R2-S2-EVO",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "21.1*",
"status": "affected",
"version": "21.1R1-EVO",
"versionType": "custom"
},
{
"lessThan": "21.2R2-EVO",
"status": "affected",
"version": "21.2",
"versionType": "custom"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
32.4%