Vulnerability Details : CVE-2020-1611
Potential exploit
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
Vulnerability category: File inclusion
Products affected by CVE-2020-1611
- cpe:2.3:o:juniper:junos_space:17.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:17.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:19.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:19.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:19.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:18.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:18.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:18.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_space:18.1:r1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1611
3.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1611
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
Juniper Networks, Inc. |
References for CVE-2020-1611
-
https://prsearch.juniper.net/InfoCenter/index?page=prcontent&id=PR1449224
Juniper Networks Inc. - Sign InPermissions Required
-
https://kb.juniper.net/JSA10993
2020-01 Security Bulletin: Junos Space: Multiple vulnerabilities resolved in 19.4R1 release. - Juniper NetworksVendor Advisory
Jump to