CVE-2018-0053

An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D30 on vSRX.
References
Link Resource
http://www.securitytracker.com/id/1041854 Third Party Advisory VDB Entry
https://kb.juniper.net/JSA10887 Vendor Advisory
http://www.securitytracker.com/id/1041854 Third Party Advisory VDB Entry
https://kb.juniper.net/JSA10887 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*
cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:37

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1041854 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041854 - Third Party Advisory, VDB Entry
References () https://kb.juniper.net/JSA10887 - Vendor Advisory () https://kb.juniper.net/JSA10887 - Vendor Advisory

Information

Published : 2018-10-10 18:29

Updated : 2024-11-21 03:37


NVD link : CVE-2018-0053

Mitre link : CVE-2018-0053

CVE.ORG link : CVE-2018-0053


JSON object : View

Products Affected

juniper

  • junos
  • vsrx
CWE
CWE-287

Improper Authentication