// For flags

CVE-2020-1614

NFX250 Series: Hardcoded credentials in the vSRX VNF instance.

Severity Score

10.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Use of Hard-coded Credentials vulnerability exists in the NFX250 Series for the vSRX Virtual Network Function (VNF) instance, which allows an attacker to take control of the vSRX VNF instance if they have the ability to access an administrative service (e.g. SSH) on the VNF, either locally, or through the network. This issue only affects the NFX250 Series vSRX VNF. No other products or platforms are affected. This issue is only applicable to environments where the vSRX VNF root password has not been configured. This issue affects the Juniper Networks NFX250 Network Services Platform vSRX VNF instance on versions prior to 19.2R1.

Se presenta una vulnerabilidad de Uso de Credenciales Embebidas en la NFX250 Series para la instancia vSRX Virtual Network Function (VNF), que permite a un atacante tomar el control de la instancia vSRX VNF si posee la capacidad de acceder a un servicio administrativo (por ejemplo, SSH) en la VNF, localmente o por medio de la red. Este problema solo afecta a la vSRX VNF de NFX250 Series. Ningún otro producto o plataforma está afectado. Este problema es solo aplicable a entornos donde la contraseña root vSRX VNF no ha sido configurada. Este problema afecta a la instancia vSRX VNF de Juniper Networks NFX250 Network Services Platform en versiones anteriores a 19.2R1.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-04 CVE Reserved
  • 2020-04-08 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
< 19.2
Search vendor "Juniper" for product "Junos" and version " < 19.2"
-
Affected
in Juniper
Search vendor "Juniper"
Nfx250
Search vendor "Juniper" for product "Nfx250"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1-s1
Affected
in Juniper
Search vendor "Juniper"
Nfx250
Search vendor "Juniper" for product "Nfx250"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1-s2
Affected
in Juniper
Search vendor "Juniper"
Nfx250
Search vendor "Juniper" for product "Nfx250"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1-s3
Affected
in Juniper
Search vendor "Juniper"
Nfx250
Search vendor "Juniper" for product "Nfx250"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1-s4
Affected
in Juniper
Search vendor "Juniper"
Nfx250
Search vendor "Juniper" for product "Nfx250"
--
Safe