// For flags

CVE-2019-0071

Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400.

Veriexec es un subsistema de integridad de archivos basado en el kernel en el sistema operativo Junos que asegura que solo puedan ser ejecutados los archivos binarios autorizados. Debido a un fallo en versiones específicas del sistema operativo Junos, que afecta a plataformas específicas de la Serie EX, el subsistema Veriexec no se inicializará, lo que esencialmente deshabilitará la comprobación de integridad de archivos. Esto puede permitir a un usuario autenticado localmente con acceso de shell instalar imágenes ejecutables no confiables y elevar los privilegios para conseguir el control total del sistema. Durante la instalación de una versión afectada del sistema operativo Junos, los siguientes mensajes se registrarán en la consola: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... Este problema afecta a Juniper Networks Junos OS: versión 18.1R3-S4 en EX2300, EX2300-C y EX3400; versión 18.3R1-S3 en EX2300, EX2300-C y EX3400.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-10-11 CVE Reserved
  • 2019-10-09 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-347: Improper Verification of Cryptographic Signature
  • CWE-354: Improper Validation of Integrity Check Value
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.1
Search vendor "Juniper" for product "Junos" and version "18.1"
r3-s4
Affected
in Juniper
Search vendor "Juniper"
Ex2300
Search vendor "Juniper" for product "Ex2300"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.1
Search vendor "Juniper" for product "Junos" and version "18.1"
r3-s4
Affected
in Juniper
Search vendor "Juniper"
Ex2300-c
Search vendor "Juniper" for product "Ex2300-c"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.1
Search vendor "Juniper" for product "Junos" and version "18.1"
r3-s4
Affected
in Juniper
Search vendor "Juniper"
Ex3400
Search vendor "Juniper" for product "Ex3400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.3
Search vendor "Juniper" for product "Junos" and version "18.3"
r1-s3
Affected
in Juniper
Search vendor "Juniper"
Ex2300
Search vendor "Juniper" for product "Ex2300"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.3
Search vendor "Juniper" for product "Junos" and version "18.3"
r1-s3
Affected
in Juniper
Search vendor "Juniper"
Ex2300-c
Search vendor "Juniper" for product "Ex2300-c"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.3
Search vendor "Juniper" for product "Junos" and version "18.3"
r1-s3
Affected
in Juniper
Search vendor "Juniper"
Ex3400
Search vendor "Juniper" for product "Ex3400"
--
Safe