6 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 359EXPL: 0

When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. • https://kb.juniper.net/JSA11191 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 10.0EPSS: 0%CPEs: 16EXPL: 0

Unspecified vulnerability in Juniper Junos Space before 13.3R1.8, when the firewall in disabled, allows remote attackers to execute arbitrary commands via unspecified vectors. Vulnerabilidad no especificada en Juniper Junos Space anterior a 13.3R1.8, cuando el firewall está deshabilitado, permite a atacantes remotos ejecutar comandos arbitrarios a través de vectores no especificados. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10626 http://www.securityfocus.com/bid/67454 http://www.securitytracker.com/id/1030254 •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in the web-based interface in Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka PR 884469. Vulnerabilidad Cross-site scripting (XSS) en el interfaz web en Juniper Junos Space anterior a v13.1R1.6, como es usado en JA1500 y en otros contextos, permite a atacantes remotos inyectar código script o HTML a través de vectores sin especificar, también conocido como PR 884469 • http://kb.juniper.net/JSA10585 http://www.securitytracker.com/id/1028923 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.0EPSS: 0%CPEs: 9EXPL: 0

Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privilege, aka PR 863804. Juniper Junos Space anterior a v13.1R1.6, como es usado en JA1500 y en otros contextos, no aplica correctamente el control de acceso basado en roles, lo que permite a usuarios remotos autenticados modificar la configuración mediante el aprovechamiento del privilegio de sólo lectura, también conocido como PR 863804. • http://kb.juniper.net/JSA10585 http://www.securityfocus.com/bid/61794 http://www.securitytracker.com/id/1028923 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.0EPSS: 0%CPEs: 9EXPL: 0

Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly restrict access to the list of user accounts and their MD5 password hashes, which makes it easier for remote authenticated users to obtain sensitive information via a dictionary attack, aka PR 879462. Juniper Junos Space anterior a v13.1R1.6, como es usado en JA1500 y en otros contextos, no aplica correctamente el acceso a la lista de cuentas de usuario y sus contraseñas codificadas en MD5, lo que hace que sea más fácil para los usuarios remotos autenticados obtener información sensible a través de un ataque de diccionario, también conocido como PR 879462. • http://kb.juniper.net/JSA10585 http://www.securitytracker.com/id/1028923 • CWE-264: Permissions, Privileges, and Access Controls •