var-201707-0293
Vulnerability from variot
An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privileges. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D40 on QFX5110, QFX5200, QFX10002, QFX10008, QFX10016, EX4600 and NFX250; 15.1 prior to 15.1R5 on EX4600; 15.1X49 prior to 15.1X49-D70 on vSRX, SRX1500, SRX4100, SRX4200; 16.1 prior to 16.1R2 on EX4600, ACX5000 series. This issue does not affect vMX. No other Juniper Networks products or platforms are affected by this issue. Juniper QFX5110 series, etc. QFX5110 series is a series of Ethernet switches; Juniper vSRX series is a series of firewall emulator products; SRX1500 series is a series of firewall devices. Junos OS is one such operating system. A security vulnerability exists in Junos OS Release 14.1X53, Release 15.1, Release 15.1X49, and Release 16.1 in several Juniper products due to the program's inability to adequately perform authentication. The following products are affected: Juniper QFX5110 series, QFX5200 series, QFX10002 series, QFX10008 series, QFX10016 series, EX4600 series, NFX250 series, EX4600 series, vSRX series, SRX1500 series, SRX4100 series, SRX4000 series, ACX
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201707-0293", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d26" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d27" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d10" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d30" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d25" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d35" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "14.1x53-d15" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x49" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1x49-d70" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "16.1" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x53-d40" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1r5" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "15.1x49" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "16.1r2" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "CNNVD", "id": "CNNVD-201707-613" }, { "db": "NVD", "id": "CVE-2017-2341" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:juniper:junos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005969" } ] }, "cve": "CVE-2017-2341", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2017-2341", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-110544", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2017-2341", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 2.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-2341", "trust": 1.0, "value": "HIGH" }, { "author": "sirt@juniper.net", "id": "CVE-2017-2341", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-2341", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201707-613", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-110544", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-110544" }, { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "CNNVD", "id": "CNNVD-201707-613" }, { "db": "NVD", "id": "CVE-2017-2341" }, { "db": "NVD", "id": "CVE-2017-2341" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An insufficient authentication vulnerability on platforms where Junos OS instances are run in a virtualized environment, may allow unprivileged users on the Junos OS instance to gain access to the host operating environment, and thus escalate privileges. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D40 on QFX5110, QFX5200, QFX10002, QFX10008, QFX10016, EX4600 and NFX250; 15.1 prior to 15.1R5 on EX4600; 15.1X49 prior to 15.1X49-D70 on vSRX, SRX1500, SRX4100, SRX4200; 16.1 prior to 16.1R2 on EX4600, ACX5000 series. This issue does not affect vMX. No other Juniper Networks products or platforms are affected by this issue. Juniper QFX5110 series, etc. QFX5110 series is a series of Ethernet switches; Juniper vSRX series is a series of firewall emulator products; SRX1500 series is a series of firewall devices. Junos OS is one such operating system. A security vulnerability exists in Junos OS Release 14.1X53, Release 15.1, Release 15.1X49, and Release 16.1 in several Juniper products due to the program\u0027s inability to adequately perform authentication. The following products are affected: Juniper QFX5110 series, QFX5200 series, QFX10002 series, QFX10008 series, QFX10016 series, EX4600 series, NFX250 series, EX4600 series, vSRX series, SRX1500 series, SRX4100 series, SRX4000 series, ACX", "sources": [ { "db": "NVD", "id": "CVE-2017-2341" }, { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "VULHUB", "id": "VHN-110544" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2341", "trust": 2.5 }, { "db": "JUNIPER", "id": "JSA10787", "trust": 1.7 }, { "db": "SECTRACK", "id": "1038893", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-005969", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201707-613", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-110544", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110544" }, { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "CNNVD", "id": "CNNVD-201707-613" }, { "db": "NVD", "id": "CVE-2017-2341" } ] }, "id": "VAR-201707-0293", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-110544" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:17:55.068000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10787", "trust": 0.8, "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10787\u0026actp=METADATA" }, { "title": "Multiple Juniper product Junos OS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71731" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "CNNVD", "id": "CNNVD-201707-613" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110544" }, { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "NVD", "id": "CVE-2017-2341" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://kb.juniper.net/jsa10787" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038893" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2341" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2341" } ], "sources": [ { "db": "VULHUB", "id": "VHN-110544" }, { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "CNNVD", "id": "CNNVD-201707-613" }, { "db": "NVD", "id": "CVE-2017-2341" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-110544" }, { "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "db": "CNNVD", "id": "CNNVD-201707-613" }, { "db": "NVD", "id": "CVE-2017-2341" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-17T00:00:00", "db": "VULHUB", "id": "VHN-110544" }, { "date": "2017-08-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "date": "2017-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-613" }, { "date": "2017-07-17T13:18:24.237000", "db": "NVD", "id": "CVE-2017-2341" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-110544" }, { "date": "2017-08-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005969" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-613" }, { "date": "2024-11-21T03:23:19.353000", "db": "NVD", "id": "CVE-2017-2341" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-613" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks Junos OS Vulnerable to gaining access to the host operating environment", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005969" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-613" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.