Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1637— Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability

CVSS 7.2 · High EPSS 0.19% · P40
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1637

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP address range instead of an IP address/netmask. See the Workaround section for more detail. The Junos OS Enforcer CLI settings are disabled by default. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D100; 15.1X49 versions prior to 15.1X49-D210; 17.3 versions prior to 17.3R2-S5, 17.3R3-S8; 17.4 versions prior to 17.4R2-S9, 17.4R3-S1; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R1-S7, 18.3R3-S2; 18.4 versions prior to 18.4R1-S6, 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S3, 19.2R2; 19.3 versions prior to 19.3R2-S1, 19.3R3; 19.4 versions prior to 19.4R1-S1, 19.4R2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用候选路径或通道进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS on SRX Series 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks SRX Series是美国瞻博网络(Juniper Networks)公司的一套SRX系列服务网关设备。Junos OS是一套专用于该公司的硬件设备的网络操作系统。 Juniper Networks Junos OS(SRX Series)中存在安全漏洞。攻击者可利用该漏洞绕过被UAC策略限制的网络资源。以下产品及版本受到影响: Juniper Networks Junos OS 12.3X48版本,15.1X49版本,17.3版本,17.4版本,18.1版本,18.2版
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 12.3X48 ~ 12.3X48-D100 -

II. Public POCs for CVE-2020-1637

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1637

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-04-08 · 22 CVEs total

CVE-2020-161410.0 CRITICALNFX250 Series: Hardcoded credentials in the vSRX VNF instance.
CVE-2020-16159.8 CRITICALJunos OS: vMX: Default credentials supplied in vMX configuration
CVE-2020-16138.6 HIGHJunos OS: BGP session termination upon receipt of specific BGP FlowSpec advertisement.
CVE-2020-16397.5 HIGHJunos OS: A crafted Ethernet OAM packet received by Junos may cause the Ethernet OAM conne
CVE-2020-16177.5 HIGHJunos OS: PTX1000 and PTX10000 Series, QFX10000 Series using non-AFT architectures: A spec
CVE-2020-16267.5 HIGHJunos OS Evolved: Denial of Service vulnerability in processing high rate of specific pack
CVE-2020-16277.5 HIGHJunos OS: vMX and MX150: Denial of Service vulnerability in packet processing
CVE-2020-16347.5 HIGHJunos OS: High-End SRX Series: Multicast traffic might cause all FPCs to reset.
CVE-2020-16387.5 HIGHJunos OS & Junos OS Evolved: A specific IPv4 packet can lead to FPC restart.
CVE-2020-16256.5 MEDIUMJunos OS: Kernel memory leak in virtual-memory due to interface flaps
CVE-2020-16186.3 MEDIUMJunos OS: EX and QFX Series: Console port authentication bypass vulnerability
CVE-2020-16196.0 MEDIUMJunos OS: QFX10K Series, EX9200 Series, MX Series, PTX Series: Privilege escalation vulner
CVE-2020-16295.9 MEDIUMJunos OS: A race condition vulnerability may cause RPD daemon to crash when processing a B
CVE-2020-16245.5 MEDIUMJunos OS Evolved: objmon logs may leak sensitive information
CVE-2020-16225.5 MEDIUMJunos OS Evolved: EvoSharedObjStore may leak sensitive information
CVE-2020-16235.5 MEDIUMJunos OS Evolved: ev.ops file may leak sensitive information
CVE-2020-16205.5 MEDIUMJunos OS Evolved: Configd leaks hashes via log file and is world readable
CVE-2020-16215.5 MEDIUMJunos OS Evolved: Configd leaks hashes via stream and is world readable
CVE-2020-16285.3 MEDIUMJunos OS: EX4300: Traffic from the network internal to the device (128.0.0.0) may be forwa
CVE-2020-16165.3 MEDIUMJATP Series: JATP Is susceptible to slow brute force attacks on the SSH service.

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-1637

No comments yet


Leave a comment