FKIE_CVE-2023-44187

Vulnerability from fkie_nvd - Published: 2023-10-11 21:15 - Updated: 2024-11-21 08:25
Summary
An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system. This issue affects Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S7-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S5-EVO; * 21.3 versions prior to 21.3R3-S4-EVO; * 21.4 versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S2-EVO; * 22.2 versions prior to 22.2R2-EVO.
Impacted products
Vendor Product Version
juniper junos_os_evolved *
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 20.4
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.1
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.2
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.3
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 21.4
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.1
juniper junos_os_evolved 22.2
juniper junos_os_evolved 22.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199",
              "versionEndExcluding": "20.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*",
              "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*",
              "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*",
              "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*",
              "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*",
              "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*",
              "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*",
              "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "52C3552E-798F-4719-B38D-F74E34EAAA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*",
              "matchCriteriaId": "AE674DD3-3590-4434-B144-5AD7EB5F039D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "0099BDA9-9D4B-4D6C-8234-EFD9E8C63476",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*",
              "matchCriteriaId": "D8729BC1-FB09-4E6D-A5D5-8BDC589555B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3:*:*:*:*:*:*",
              "matchCriteriaId": "9D72C3DF-4513-48AC-AAED-C1AADF0794E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "8C583289-96C4-4451-A320-14CA1C390819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "FA43782E-0719-496E-9237-E1ABD3C4C664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "78897DD2-E161-4191-94FF-7400FB612DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
              "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*",
              "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*",
              "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*",
              "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*",
              "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*",
              "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*",
              "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*",
              "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*",
              "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*",
              "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*",
              "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*",
              "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*",
              "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*",
              "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*",
              "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*",
              "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*",
              "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*",
              "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*",
              "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*",
              "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*",
              "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An Exposure of Sensitive Information vulnerability in the \u0027file copy\u0027 command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n  *  All versions prior to 20.4R3-S7-EVO;\n  *  21.1 versions 21.1R1-EVO and later;\n  *  21.2 versions prior to 21.2R3-S5-EVO;\n  *  21.3 versions prior to 21.3R3-S4-EVO;\n  *  21.4 versions prior to 21.4R3-S4-EVO;\n  *  22.1 versions prior to 22.1R3-S2-EVO;\n  *  22.2 versions prior to 22.2R2-EVO.\n\n\n"
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Exposici\u00f3n de Informaci\u00f3n Confidencial en el comando \u0027file copy\u0027 de Junos OS Evolved permite a un atacante local autenticado con acceso al shell ver las contrase\u00f1as proporcionadas en la l\u00ednea de comandos CLI. Estas credenciales se pueden utilizar para proporcionar acceso no autorizado al sistema remoto. Este problema afecta a Juniper Networks Junos OS Evolved: * Todas las versiones anteriores a 20.4R3-S7-EVO; * 21.1 versiones 21.1R1-EVO y posteriores; * Versiones 21.2 anteriores a 21.2R3-S5-EVO; * Versiones 21.3 anteriores a 21.3R3-S4-EVO; * Versiones 21.4 anteriores a 21.4R3-S4-EVO; * Versiones 22.1 anteriores a 22.1R3-S2-EVO; * Versiones 22.2 anteriores a 22.2R2-EVO."
    }
  ],
  "id": "CVE-2023-44187",
  "lastModified": "2024-11-21T08:25:23.983",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 4.0,
        "source": "sirt@juniper.net",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-11T21:15:09.970",
  "references": [
    {
      "source": "sirt@juniper.net",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://supportportal.juniper.net/JSA73151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://supportportal.juniper.net/JSA73151"
    }
  ],
  "sourceIdentifier": "sirt@juniper.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "sirt@juniper.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…