No analysis available yet.
Vendor Solution
Junos OS now stores local password hashes in the protected /etc/shadow file. The following software releases have been updated to resolve this specific issue: Junos OS 19.4R3, 20.1R1-S4, 20.1R2, 20.2R1, and all subsequent releases.
Vendor Workaround
Use access lists or firewall filters to limit access to the device only from trusted hosts. Limit shell access to only trusted system administrators.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-12531 | The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2. |
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11066 |
|
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T01:41:49.079Z
Reserved: 2019-11-04T00:00:00.000Z
Link: CVE-2020-1669
No data.
Status : Modified
Published: 2020-10-16T21:15:12.880
Modified: 2024-11-21T05:11:07.487
Link: CVE-2020-1669
No data.
OpenCVE Enrichment
No data.
EUVD