The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0880 The PKI keys exported using the command "run request security pki key-pair export" on Junos OS may have insecure file permissions. This may allow another user on the Junos OS device with shell access to read them. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D180; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: 15.1X49-D180, 17.3R3-S7*, 17.4R2-S8, 17.4R3*, 18.1R3-S8*, 18.2R3, 18.3R2, 18.4R2, 19.1R1, and all subsequent releases. *pending release.


Workaround

Do not use directories readable by other users (such as /tmp) while exporting PKI keys. Limit access to the Junos OS device to only trusted administrators.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T19:20:57.184Z

Reserved: 2018-10-11T00:00:00

Link: CVE-2019-0073

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-09T20:15:18.287

Modified: 2024-11-21T04:16:11.720

Link: CVE-2019-0073

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.