CVE-2020-1624Log File Information Exposure in Networks Junos OS Evolved

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 69.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified19.1R1-EVO

🔴Vulnerability Details

2
GHSA
GHSA-hf43-vx6m-vr9g: A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files2022-05-24
CVEList
Junos OS Evolved: objmon logs may leak sensitive information2020-04-08

📋Vendor Advisories

1
Juniper
CVE-2020-1624: A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This iss2020-04-08
CVE-2020-1624 — Log File Information Exposure | cvebase