CVE-2020-1623Log File Information Exposure in Networks Junos OS Evolved

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 83.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions of Junos OS Evolved prior to 19.2R1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified19.2R1-EVO

🔴Vulnerability Details

2
GHSA
GHSA-c2fg-jphc-cxg4: A local, authenticated user with shell can view sensitive configuration information via the ev2022-05-24
CVEList
Junos OS Evolved: ev.ops file may leak sensitive information2020-04-08

📋Vendor Advisories

1
Juniper
CVE-2020-1623: A local, authenticated user with shell can view sensitive configuration information via the ev.ops configuration file. This issue affects all versions2020-04-08

💬Community

1
Bugzilla
CVE-2019-13311 ImageMagick: memory leaks at AcquireMagickMemory because of a wand/mogrify.c error2019-07-16
CVE-2020-1623 — Log File Information Exposure | cvebase