CVE-2020-1669Plaintext Storage of a Password in Networks Junos OS

Severity
6.3MEDIUMNVD
EPSS
0.1%
top 84.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4,

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:NExploitability: 1.0 | Impact: 5.2

Affected Packages2 packages

CVEListV5juniper_networks/junos_os19.419.4R3+1
NVDjuniper/junos19.4, 20.1+1

🔴Vulnerability Details

2
GHSA
GHSA-9pj7-q8h3-hrhp: The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password2022-05-24
CVEList
Junos OS: NFX350: Password hashes stored in world-readable format2020-10-16

📋Vendor Advisories

1
Juniper
CVE-2020-1669: The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password2020-10-16
CVE-2020-1669 — Plaintext Storage of a Password | cvebase