CVE-2018-0010Improper Privilege Management in Juniper Junos Space

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 65.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 10
Latest updateOct 28

Description

A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages1 packages

NVDjuniper/junos_space7 versions+6

Patches

🔴Vulnerability Details

3
OSV
f2fs: fix to do sanity check on node footer for non inode dnode2025-10-28
GHSA
GHSA-mqj9-7x6g-mr5p: A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was2022-05-13
CVEList
CVE-2018-0010: A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was2018-01-10

💥Exploits & PoCs

2
Exploit-DB
D-Link Central WiFiManager Software Controller 1.03 - Multiple Vulnerabilities2018-10-05
Exploit-DB
BMC BladeLogic 8.3.00.64 - Remote Command Execution2018-01-26

📋Vendor Advisories

5
Red Hat
kernel: netfs: Call `invalidate_cache` only if implemented2025-04-03
Red Hat
kernel: fs/netfs/fscache_cookie: add missing "n_accesses" check2024-09-04
Red Hat
kernel: hwmon: (nct6775) Fix crash in clear_caseopen2024-06-20
Red Hat
kernel: drm/dp: Fix divide-by-zero regression on DP MST unplug with nouveau2024-05-01
Juniper
CVE-2018-0010: A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was2018-01-10
CVE-2018-0010 — Improper Privilege Management | cvebase