6.3

CVE-2020-1669

The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version19.4 Updater1
   JuniperNfx350 Version-
JuniperJunos Version19.4 Updater1-s1
   JuniperNfx350 Version-
JuniperJunos Version19.4 Updater1-s2
   JuniperNfx350 Version-
JuniperJunos Version19.4 Updater2
   JuniperNfx350 Version-
JuniperJunos Version20.1 Updater1
   JuniperNfx350 Version-
JuniperJunos Version20.1 Updater1-s1
   JuniperNfx350 Version-
JuniperJunos Version20.1 Updater1-s2
   JuniperNfx350 Version-
JuniperJunos Version20.1 Updater1-s3
   JuniperNfx350 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.128
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
sirt@juniper.net 6.3 1 5.2
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CWE-256 Plaintext Storage of a Password

Storing a password in plaintext may result in a system compromise.

CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.