Lucene search

K
nessusThis script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.JUNIPER_JSA69720.NASL
HistoryJul 21, 2022 - 12:00 a.m.

Juniper Junos Information Exposure (JSA69720)

2022-07-2100:00:00
This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
19
juniper junos os
multiple vulnerabilities
jsa69720
network interface card
pfe
unauthorized access
sensitive information
cve-2003-0001
cve-2022-22216
etherleak
remote attackers
unauthorized actor
kernel memory
ethernet packets
ptx series
qfx10k series
system memory
data leakage

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.026

Percentile

90.4%

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the PFE of Juniper Networks Junos OS on PTX Series and QFX10k Series allows an adjacent unauthenticated attacker to gain access to sensitive information. PTX1000 and PTX10000 Series, and QFX10000 Series and PTX5000 Series devices sometimes do not reliably pad Ethernet packets, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as ‘Etherleak’ and often detected as CVE-2003-0001.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

File data juniper_JSA69720.nasl

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.026

Percentile

90.4%