The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-12531 The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2.
Fixes

Solution

Junos OS now stores local password hashes in the protected /etc/shadow file. The following software releases have been updated to resolve this specific issue: Junos OS 19.4R3, 20.1R1-S4, 20.1R2, 20.2R1, and all subsequent releases.


Workaround

Use access lists or firewall filters to limit access to the device only from trusted hosts. Limit shell access to only trusted system administrators.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-17T01:41:49.079Z

Reserved: 2019-11-04T00:00:00

Link: CVE-2020-1669

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-16T21:15:12.880

Modified: 2024-11-21T05:11:07.487

Link: CVE-2020-1669

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.