CVE-2018-0053Improper Authentication in Networks Junos OS

Severity
6.8MEDIUMNVD
EPSS
0.1%
top 84.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10
Latest updateMay 13

Description

An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D30 on vSRX.

CVSS vector

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages4 packages

CVEListV5juniper_networks/junos_os15.1X4915.1X49-D30
NVDjuniper/junos15.1x49

🔴Vulnerability Details

1
GHSA
GHSA-3vrq-6257-h5x3: An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full con2022-05-13

💥Exploits & PoCs

3
Exploit-DB
VBScript - 'rtFilter' Out-of-Bounds Read2018-11-30
Exploit-DB
VBScript - 'OLEAUT32!VariantClear' and 'scrrun!VBADictionary::put_Item' Use-After-Free2018-11-30
Exploit-DB
ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions2018-03-05

📋Vendor Advisories

1
Juniper
CVE-2018-0053: An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full con2018-10-10
CVE-2018-0053 — Improper Authentication | cvebase