Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-2850 | A path traversal vulnerability in the Juniper Networks SRX and vSRX Series may allow an authenticated J-web user to read sensitive system files. This issue affects Juniper Networks Junos OS on SRX and vSRX Series: 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S3, 20.2R2; This issue does not affect Juniper Networks Junos OS versions prior to 19.3R1. |
Solution
The following software releases have been updated to resolve this specific issue: 19.3R2-S6, 19.3R3-S1, 19.4R2-S4, 19.4R3, 20.1R1-S4, 20.1R2, 20.2R1-S3, 20.2R2, 20.3R1, and all subsequent releases.
Workaround
There are no viable workarounds for this issue. To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted administrative networks, hosts and users.
Link | Providers |
---|---|
https://kb.juniper.net/JSA11126 |
![]() ![]() |
Tue, 17 Sep 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Junos OS: SRX, vSRX Series: J-Web Path traversal vulnerability in SRX and vSRX Series leads to information disclosure. | Junos OS: SRX, vSRX Series: J-Web Path traversal vulnerability in SRX and vSRX Series leads to information disclosure. |

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T03:33:41.805Z
Reserved: 2020-10-27T00:00:00
Link: CVE-2021-0231

No data.

Status : Modified
Published: 2021-04-22T20:15:08.673
Modified: 2024-11-21T05:42:15.657
Link: CVE-2021-0231

No data.

No data.