Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0035— Junos OS: QFX5200 and QFX10002: Unintended ONIE partition was shipped with certain Junos OS .bin and .iso images

EPSS 0.26% · P50
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0035

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: QFX5200 and QFX10002: Unintended ONIE partition was shipped with certain Junos OS .bin and .iso images
Source: NVD (National Vulnerability Database)
Vulnerability Description
QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended additional Open Network Install Environment (ONIE) partition. This additional partition allows the superuser to reboot to the ONIE partition which will wipe out the content of the Junos partition and its configuration. Once rebooted, the ONIE partition will not have root password configured, thus any user can access the console or SSH, using an IP address acquired from DHCP, as root without password. Once the device has been shipped or upgraded with the ONIE partition installed, the issue will persist. Simply upgrading to higher release via the CLI will not resolve the issue. No other Juniper Networks products or platforms are affected by this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper QFX5200和QFX10002 Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper QFX5200和QFX10002都是美国瞻博网络(Juniper Networks)公司的数据中心交换机设备。Junos OS是运行在其中的一套操作系统。 Juniper QFX5200和QFX10002设备上的Junos OS中存在安全漏洞,该漏洞源于超级用户可是使用一个多余的Open Network Install Environment (ONIE)分区来清除内容及配置。攻击者可利用该漏洞以root用户身份访问控制台或SSH。以下版本受到影响:Junos OS 15.1X53-D21
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 15.1X53 ~ 15.1X53-D60 -

II. Public POCs for CVE-2018-0035

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0035

Please Login to view more intelligence information

Same Patch Batch · Juniper Networks · 2018-07-11 · 14 CVEs total

CVE-2018-0024Junos OS: A privilege escalation vulnerability exists where authenticated users with shell
CVE-2018-0025Junos OS: SRX Series: Credentials exposed when using HTTP and HTTPS Firewall Pass-through
CVE-2018-0026Junos OS: Stateless IP firewall filter rules stop working as expected after reboot or upgr
CVE-2018-0027Junos OS: Receipt of malformed RSVP packet may lead to RPD denial of service
CVE-2018-0029Junos OS: Kernel crash (vmcore) during broadcast storm after enabling 'monitor traffic int
CVE-2018-0030Junos OS: MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) and PTX1K: Line card may crash upon receipt
CVE-2018-0031Junos OS: Receipt of specially crafted UDP packets over MPLS may bypass stateless IP firew
CVE-2018-0032Junos OS: RPD crash when receiving a crafted BGP UPDATE
CVE-2018-0034Junos OS: A malicious crafted IPv6 DHCP packet may cause the JDHCPD daemon to core
CVE-2018-0037Junos OS: RPD daemon crashes due to receipt of crafted BGP NOTIFICATION messages
CVE-2018-0039Contrail Service Orchestration: Hardcoded credentials for Grafana service
CVE-2018-0040Contrail Service Orchestration: hardcoded cryptographic certificates and keys
CVE-2018-0041Contrail Service Orchestration: Hardcoded credentials for Keystone service.

IV. Related Vulnerabilities

V. Comments for CVE-2018-0035

No comments yet


Leave a comment