CVE-2018-0025 — Channel Accessible by Non-Endpoint in Networks Junos OS
Severity
8.1HIGHNVD
EPSS
0.2%
top 56.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 11
Latest updateMay 13
Description
When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the initial HTTP/HTTPS session is at risk that these credentials may be captured during follow-on HTTP/HTTPS requests by a malicious actor through a man-in-the-middle attack or by authentic servers subverted by malicious actors. FTP, and Telnet pass-through authentication services are not affected. Affected releases are Juniper Networks SRX Series: 12.1X4…
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
1GHSA▶
GHSA-2g26-r5g4-jhv2: When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the ini↗2022-05-13
💥Exploits & PoCs
1📋Vendor Advisories
1Juniper▶
CVE-2018-0025: When an SRX Series device is configured to use HTTP/HTTPS pass-through authentication services, a client sending authentication credentials in the ini↗2018-07-11