Vulnerability Details : CVE-2020-1622
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
Products affected by CVE-2020-1622
- cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1622
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1622
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2020-1622
-
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.Assigned by: nvd@nist.gov (Primary)
-
The product does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use, and release.Assigned by: sirt@juniper.net (Secondary)
References for CVE-2020-1622
-
https://kb.juniper.net/JSA11003
2020-04 Security Bulletin: Junos OS Evolved: Local log files accessible from the shell may leak sensitive information - Juniper NetworksVendor Advisory
Jump to