Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0071— Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS

CVSS 7.8 · High EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-0071

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS
Source: NVD (National Vulnerability Database)
Vulnerability Description
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS 18.1R3-S4版本和18.3R1-S3版本中存在安全漏洞。攻击者可利用该漏洞安装不可信的可执行镜像,提升权限,进而完全控制系统。以下产品及版本受到影响:Juniper Networks EX2300;EX2300-C;EX3400。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 18.1R3-S4 -

II. Public POCs for CVE-2019-0071

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-0071

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2019-10-09 · 25 CVEs total

CVE-2019-00478.8 HIGHJunos OS: Persistent XSS vulnerability in J-Web
CVE-2019-00708.8 HIGHJunos OS: NFX Series: An Improper Input Validation weakness allows a malicious local attac
CVE-2019-00587.8 HIGHJunos OS: SRX Series: A weakness in the Veriexec subsystem may allow privilege escalation.
CVE-2019-00617.8 HIGHJunos OS: Insecure management daemon (MGD) configuration may allow local privilege escalat
CVE-2019-00577.8 HIGHNFX Series: An attacker may be able to take control of the JDM application and subsequentl
CVE-2019-00607.5 HIGHJunos OS: SRX Series: flowd process crash due to processing of specific transit IP packets
CVE-2019-00567.5 HIGHJunos OS: MX Series: An MPC10 Denial of Service (DoS) due to OSPF states transitioning to
CVE-2019-00557.5 HIGHJunos OS: SRX Series: An attacker may cause flowd to crash by sending certain valid SIP tr
CVE-2019-00507.5 HIGHJunos OS: SRX1500: Denial of service due to crash of srxpfe process under heavy traffic co
CVE-2019-00757.5 HIGHJunos OS: SRX Series: Denial of Service vulnerability in srxpfe related to PIM
CVE-2019-00667.5 HIGHJunos OS: A malformed IPv4 packet received by Junos in an NG-mVPN scenario may cause the r
CVE-2019-00647.5 HIGHJunos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet
CVE-2019-00627.5 HIGHJunos OS: Session fixation vulnerability in J-Web
CVE-2019-00597.5 HIGHJunos OS: The routing protocol process (rpd) may crash and generate core files upon receip
CVE-2019-00546.8 MEDIUMJunos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks
CVE-2019-00736.6 MEDIUMJunos OS: PKI key pairs are exported with insecure file permissions
CVE-2019-00686.5 MEDIUMJunos OS: SRX Series: Denial of Service vulnerability in flowd due to multicast packets
CVE-2019-00676.5 MEDIUMJunos OS: Kernel crash (vmcore) upon receipt of a specific link-local IPv6 packet on devic
CVE-2019-00516.5 MEDIUMSRX5000 Series: Denial of Service vulnerability in SSL-Proxy feature.
CVE-2019-00636.5 MEDIUMJunos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message

Showing top 20 of 25 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-0071

No comments yet


Leave a comment