Vulnerability Details : CVE-2020-1624
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
Products affected by CVE-2020-1624
- cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1624
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1624
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2020-1624
-
The product writes sensitive information to a log file.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
References for CVE-2020-1624
-
https://kb.juniper.net/JSA11003
2020-04 Security Bulletin: Junos OS Evolved: Local log files accessible from the shell may leak sensitive information - Juniper NetworksVendor Advisory
Jump to