7.1

CVE-2019-0073

The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version15.1x49 Update-
JuniperJunos Version15.1x49 Updated10
JuniperJunos Version15.1x49 Updated100
JuniperJunos Version15.1x49 Updated110
JuniperJunos Version15.1x49 Updated120
JuniperJunos Version15.1x49 Updated130
JuniperJunos Version15.1x49 Updated140
JuniperJunos Version15.1x49 Updated150
JuniperJunos Version15.1x49 Updated160
JuniperJunos Version15.1x49 Updated170
JuniperJunos Version15.1x49 Updated20
JuniperJunos Version15.1x49 Updated30
JuniperJunos Version15.1x49 Updated35
JuniperJunos Version15.1x49 Updated40
JuniperJunos Version15.1x49 Updated45
JuniperJunos Version15.1x49 Updated50
JuniperJunos Version15.1x49 Updated55
JuniperJunos Version15.1x49 Updated60
JuniperJunos Version15.1x49 Updated65
JuniperJunos Version15.1x49 Updated70
JuniperJunos Version15.1x49 Updated75
JuniperJunos Version15.1x49 Updated80
JuniperJunos Version15.1x49 Updated90
JuniperJunos Version17.3 Update-
JuniperJunos Version17.3 Updater1
JuniperJunos Version17.3 Updater2
JuniperJunos Version17.3 Updater2-s1
JuniperJunos Version17.3 Updater2-s2
JuniperJunos Version17.3 Updater3
JuniperJunos Version17.3 Updater3-s1
JuniperJunos Version17.3 Updater3-s2
JuniperJunos Version17.3 Updater3-s3
JuniperJunos Version17.3 Updater3-s4
JuniperJunos Version17.3 Updater3-s5
JuniperJunos Version17.3 Updater3-s6
JuniperJunos Version17.4 Update-
JuniperJunos Version17.4 Updater1
JuniperJunos Version17.4 Updater1-s1
JuniperJunos Version17.4 Updater1-s2
JuniperJunos Version17.4 Updater1-s4
JuniperJunos Version17.4 Updater1-s6
JuniperJunos Version17.4 Updater1-s7
JuniperJunos Version17.4 Updater2
JuniperJunos Version17.4 Updater2-s1
JuniperJunos Version17.4 Updater2-s3
JuniperJunos Version17.4 Updater2-s4
JuniperJunos Version17.4 Updater2-s5
JuniperJunos Version17.4 Updater2-s6
JuniperJunos Version17.4 Updater2-s7
JuniperJunos Version18.1 Update-
JuniperJunos Version18.1 Updater2
JuniperJunos Version18.1 Updater2-s1
JuniperJunos Version18.1 Updater2-s2
JuniperJunos Version18.1 Updater2-s4
JuniperJunos Version18.1 Updater3
JuniperJunos Version18.1 Updater3-s2
JuniperJunos Version18.1 Updater3-s3
JuniperJunos Version18.1 Updater3-s4
JuniperJunos Version18.1 Updater3-s5
JuniperJunos Version18.1 Updater3-s6
JuniperJunos Version18.1 Updater3-s7
JuniperJunos Version18.2 Update-
JuniperJunos Version18.2 Updater1-s5
JuniperJunos Version18.2 Updater2
JuniperJunos Version18.2 Updater2-s1
JuniperJunos Version18.2 Updater2-s2
JuniperJunos Version18.2 Updater2-s3
JuniperJunos Version18.2 Updater2-s4
JuniperJunos Version18.3 Update-
JuniperJunos Version18.3 Updater1
JuniperJunos Version18.3 Updater1-s1
JuniperJunos Version18.3 Updater1-s2
JuniperJunos Version18.3 Updater1-s3
JuniperJunos Version18.4 Update-
JuniperJunos Version18.4 Updater1
JuniperJunos Version18.4 Updater1-s2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.061
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.1 1.8 5.2
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
sirt@juniper.net 6.6 1.3 5.2
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CWE-281 Improper Preservation of Permissions

The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.

CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.