CVE-2020-1620Improper Control of a Resource Through its Lifetime in Networks Junos OS Evolved

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 67.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Junos OS Evolved prior to 19.3R1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified19.3R1-EVO

🔴Vulnerability Details

2
GHSA
GHSA-36rr-mv68-7vvr: A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log2022-05-24
CVEList
Junos OS Evolved: Configd leaks hashes via log file and is world readable2020-04-08

📋Vendor Advisories

1
Juniper
CVE-2020-1620: A local, authenticated user with shell can obtain the hashed values of login passwords via configd streamer log. This issue affects all versions of Ju2020-04-08
CVE-2020-1620 — Networks Junos OS Evolved vulnerability | cvebase