Junos OS Evolved: 'file copy' CLI command can disclose password to shell users
CVE-2023-44187

5.9MEDIUM

Key Information:

Vendor
CVE Published:
11 October 2023

Badges

๐Ÿ‘พ Exploit Exists๐Ÿ“ฐ News Worthy

Summary

An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system.

This issue affects Juniper Networks Junos OS Evolved:

  • All versions prior to 20.4R3-S7-EVO;
  • 21.1 versions 21.1R1-EVO and later;
  • 21.2 versions prior to 21.2R3-S5-EVO;
  • 21.3 versions prior to 21.3R3-S4-EVO;
  • 21.4 versions prior to 21.4R3-S4-EVO;
  • 22.1 versions prior to 22.1R3-S2-EVO;
  • 22.2 versions prior to 22.2R2-EVO.

Affected Version(s)

Junos OS Evolved 0 < 20.4R3-S7-EVO

Junos OS Evolved 21.1R1 < 21.1*

Junos OS Evolved 21.2 < 21.2R3-S5-EVO

News Articles

Juniper Networks Junos OS Flaw Let Attackers Flood the system

Three new vulnerabilities have been discovered in Junos OS which were associated with password disclosure, MAC address validation bypass.

5 months ago

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ฐ

    First article discovered by GBHackers News

  • Vulnerability published

  • Vulnerability Reserved

.