Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1652— Junos Space: OpenNMS is accessible via port 9443

CVSS 5.6 · Medium EPSS 0.48% · P65
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1652

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos Space: OpenNMS is accessible via port 9443
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenNMS is accessible via port 9443
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
故意性的信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos Space和Security Director 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos Space和Junos Space Security Director都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos Space是一套网络管理解决方案。该方案支持在设备和服务的整个生命周期内对其进行自动配置、监控和故障排除。Junos Space Security Director是一款用于管理Junos Space解决方案的应用程序。 Juniper Networks Junos Space 20
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos Space 20.1 ~ 20.1R1 -

II. Public POCs for CVE-2020-1652

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1652

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-07-17 · 15 CVEs total

CVE-2020-16549.8 CRITICALJunos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is en
CVE-2020-16479.8 CRITICALJunos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution d
CVE-2020-16458.3 HIGHJunos OS: MX Series: Services card might restart when DNS filtering is enabled
CVE-2020-16537.5 HIGHJunos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak
CVE-2020-16497.5 HIGHJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reass
CVE-2020-16507.5 HIGHJunos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-M
CVE-2020-16487.5 HIGHJunos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet
CVE-2020-16467.5 HIGHJunos OS and Junos OS Evolved: RPD crash while processing a specific BGP update informatio
CVE-2020-16447.5 HIGHJunos OS and Junos OS Evolved: RPD crash due to specific BGP UPDATE packets
CVE-2020-16407.5 HIGHJunos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash.
CVE-2020-16516.5 MEDIUMJunos OS: MX Series: PFE on the line card may crash due to memory leak.
CVE-2020-16416.5 MEDIUMJunos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and a
CVE-2020-16435.5 MEDIUMJunos OS: EX Series: RPD crash when executing specific "show ospf interface" commands from
CVE-2020-16555.3 MEDIUMJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmen

IV. Related Vulnerabilities

V. Comments for CVE-2020-1652

No comments yet


Leave a comment