FKIE_CVE-2021-0220
Vulnerability from fkie_nvd - Published: 2021-01-15 18:15 - Updated: 2024-11-21 05:42
Severity ?
Summary
The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.
References
| URL | Tags | ||
|---|---|---|---|
| sirt@juniper.net | https://kb.juniper.net/JSA11110 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA11110 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:junos_space:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "289CAAE5-882C-4236-BF76-B20F8A7F3014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DA36F3E8-0F58-4635-843C-B3C62FD48682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CEA96869-72CF-49D2-94E1-4FF8102A29CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "21DA6F2F-72F5-4D3A-AB4C-2C5D56C615FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F6CF9AF7-A335-4C05-9F45-08253A521D40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "87F7E9A7-CA85-4F4D-8F0C-DF0C79A80B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "61A323AE-7C8D-49F3-BB47-15DEBAFC86BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EAEC058B-C096-455B-9A75-5191E00A367D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E79208-AF42-48D9-990C-E2E2E1DE8E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DA5E2C05-12C0-48B6-BE84-0A045B2A2B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "167749D0-F3B8-48F3-BFC8-37A531E48C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C754E5-ACBB-45DE-B983-0888A8EB7CD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "84E7CE7F-4410-461D-9381-B186789B6509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:13.1:-:*:*:*:*:*:*",
"matchCriteriaId": "5BE1AAAA-0C4E-4059-96E7-4D118BF2DBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:13.1:r1.8:*:*:*:*:*:*",
"matchCriteriaId": "04858E4C-720A-400E-81AF-B5572424B351",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:13.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "5EDD9296-6FB1-45E2-80EE-9F0F84CAFC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:14.1:-:*:*:*:*:*:*",
"matchCriteriaId": "DC29AA1D-4CBC-413A-9333-72F3616CE918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:15.1:-:*:*:*:*:*:*",
"matchCriteriaId": "E0D618D6-F413-47DD-BD26-4F62B7227A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:15.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "B5A79F3A-80B9-4D98-92EE-681ED2E716B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:15.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "3E4B00D0-93F9-4145-BA91-6F4A66F19854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:15.2:-:*:*:*:*:*:*",
"matchCriteriaId": "74CB3FCB-192A-48A7-9FF3-3D228729AC60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:16.1:-:*:*:*:*:*:*",
"matchCriteriaId": "2EB54773-A54F-4D9E-B213-464421B4FA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:17.1:-:*:*:*:*:*:*",
"matchCriteriaId": "28D46176-27CE-4EAF-AF83-83F81A798103",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:17.2:-:*:*:*:*:*:*",
"matchCriteriaId": "F3EAC6FC-A2DC-4EF1-BF56-93728A9CDDAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:17.2:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "BE35151C-FCF6-4A89-8283-B24225019241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:18.1:-:*:*:*:*:*:*",
"matchCriteriaId": "041D10A1-B577-4109-A98D-DA20560FDA37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:18.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D82DF30A-C838-49AC-95DC-16D765FD5588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:18.2:-:*:*:*:*:*:*",
"matchCriteriaId": "3FD83E88-0DD9-4584-B594-2839D15FA055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:18.3:-:*:*:*:*:*:*",
"matchCriteriaId": "5F1FA208-9AC5-414A-917A-6595917440EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:18.4:-:*:*:*:*:*:*",
"matchCriteriaId": "746F17A3-C20A-495D-9EEA-635392ECE907",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:juniper:junos_space:19.1:-:*:*:*:*:*:*",
"matchCriteriaId": "F113B1F6-CF32-4BB4-A3C5-638D1531FE9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:15.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "CC5AA529-494F-4297-88FE-4C58B8FCA8F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:15.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "0F319D4E-938C-44AF-868A-FBFF077D6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7481D0BF-0B4E-41E1-9DC7-0CBEE8375A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9C4A0C81-8572-4611-BD73-FE84099E7D35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:18.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "58BFEC5C-5F42-4222-8B5B-AAC9466AEC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:18.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "E7BA0A62-CEBF-4B19-AB8C-AB29209EC59E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:18.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "93C64B73-6631-4369-9CC3-8CE4EDB7A790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:18.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "DD163C75-D934-4960-9834-8BA2A0218A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:19.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "222D409D-F0C5-4B52-84FC-D199A00A7ED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:19.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "34CAC9C5-05C5-4027-A011-6EAA3DC5DB03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:19.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "C04B6957-6526-4387-B146-8D9A11943F59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:19.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "480F31B7-6C19-466B-8083-0740D83D6309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos_space:20.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "BE62ED23-10C0-470A-8835-B6E6DACF1023",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1."
},
{
"lang": "es",
"value": "Se ha encontrado que Junos Space Network Management Platform almacena secretos compartidos en un formato recuperable que puede ser expuesto por medio de la Interfaz de Usuario.\u0026#xa0;Un atacante que puede ejecutar c\u00f3digo arbitrario en el navegador de la v\u00edctima (por ejemplo, por medio de un ataque de tipo XSS) o acceder al contenido almacenado en cach\u00e9 puede obtener una copia de las credenciales administradas por Junos Space.\u0026#xa0;El impacto de un ataque con \u00e9xito incluye, pero no est\u00e1 limitado a, conseguir acceso a otros servidores conectados a Junos Space Management Platform.\u0026#xa0;Este problema afecta a Juniper Networks Junos Space versiones anteriores a 20.3R1"
}
],
"id": "CVE-2021-0220",
"lastModified": "2024-11-21T05:42:14.073",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0,
"source": "sirt@juniper.net",
"type": "Secondary"
}
]
},
"published": "2021-01-15T18:15:15.667",
"references": [
{
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA11110"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA11110"
}
],
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-257"
}
],
"source": "sirt@juniper.net",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…