CVE-2020-1637Authentication Bypass Using an Alternate Path or Channel in Networks Junos OS

Severity
6.5MEDIUMNVD
CNA7.2
EPSS
0.2%
top 59.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP address range instead of an IP address/netmask. See the Workaround section for more detail. The Junos OS Enforcer CLI settings are disabled by default. This issue affects Juniper Networks Junos OS on SRX S

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5

Affected Packages2 packages

CVEListV5juniper_networks/junos_os12.3X4812.3X48-D100+11
NVDjuniper/junos12 versions+11

🔴Vulnerability Details

2
GHSA
GHSA-v5h6-rmj4-6h5m: A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are n2022-05-24
CVEList
Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability2020-04-08

📋Vendor Advisories

1
Juniper
CVE-2020-1637: A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are n2020-04-08
CVE-2020-1637 — Juniper Networks Junos OS vulnerability | cvebase