Vulnerability Details : CVE-2019-0074
A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series with Next-Generation Routing Engine (NG-RE) which uses vmhost. This issue affects Juniper Networks Junos OS on NFX150 Series and QFX10K, EX9200 Series, MX Series and PTX Series with NG-RE and vmhost: 15.1F versions prior to 15.1F6-S12 16.1 versions starting from 16.1R6 and later releases, including the Service Releases, prior to 16.1R6-S6, 16.1R7-S3; 17.1 versions prior to 17.1R3; 17.2 versions starting from 17.2R1-S3, 17.2R3 and later releases, including the Service Releases, prior to 17.2R3-S1; 17.3 versions starting from 17.3R1-S1, 17.3R2 and later releases, including the Service Releases, prior to 17.3R3-S3; 17.4 versions starting from 17.4R1 and later releases, including the Service Releases, prior to 17.4R1-S6, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2, 18.3R2; 18.4 versions prior to 18.4R1-S1, 18.4R2. This issue does not affect: Juniper Networks Junos OS 15.1 and 16.2.
Vulnerability category: Directory traversal
Products affected by CVE-2019-0074
- cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-0074
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 9 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-0074
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2019-0074
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
-
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.Assigned by: sirt@juniper.net (Secondary)
References for CVE-2019-0074
-
https://kb.juniper.net/JSA10975
Vendor Advisory
Jump to