CVE-2020-1621Improper Control of a Resource Through its Lifetime in Networks Junos OS Evolved

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 67.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS Evolved prior to 19.3R1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified19.3R1-EVO

🔴Vulnerability Details

2
GHSA
GHSA-cwf2-c942-3pqv: A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces2022-05-24
CVEList
Junos OS Evolved: Configd leaks hashes via stream and is world readable2020-04-08

📋Vendor Advisories

1
Juniper
CVE-2020-1621: A local, authenticated user with shell can obtain the hashed values of login passwords via configd traces. This issue affects all versions of Junos OS2020-04-08
CVE-2020-1621 — Networks Junos OS Evolved vulnerability | cvebase