// For flags

CVE-2020-1616

JATP Series: JATP Is susceptible to slow brute force attacks on the SSH service.

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Due to insufficient server-side login attempt limit enforcement, a vulnerability in the SSH login service of Juniper Networks Juniper Advanced Threat Prevention (JATP) Series and Virtual JATP (vJATP) devices allows an unauthenticated, remote attacker to perform multiple login attempts in excess of the configured login attempt limit. Successful exploitation will allow the attacker to perform brute-force password attacks on the SSH service. This issue affects: Juniper Networks JATP and vJATP versions prior to 5.0.6.0.

Debido a la insuficiente aplicación del límite del intento de inicio de sesión del lado del servidor, una vulnerabilidad en el servicio de inicio de sesión SSH de los dispositivos Juniper Networks Juniper Advanced Threat Prevention (JATP) Series y Virtual JATP (vJATP), permite a un atacante remoto no autenticado llevar a cabo múltiples intentos de inicio de sesión que exceden el límite de intento de inicio de sesión configurado. Una explotación con éxito permitirá al atacante realizar ataques de contraseña de fuerza bruta en el servicio SSH. Este problema afecta: JATP y vJATP de Juniper Networks versiones anteriores a 5.0.6.0.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-04 CVE Reserved
  • 2020-04-08 CVE Published
  • 2023-04-12 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-307: Improper Restriction of Excessive Authentication Attempts
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA10999 2020-04-14
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Advanced Threat Protection
Search vendor "Juniper" for product "Advanced Threat Protection"
< 5.0.6.0
Search vendor "Juniper" for product "Advanced Threat Protection" and version " < 5.0.6.0"
-
Affected
Juniper
Search vendor "Juniper"
Virtual Advanced Threat Protection
Search vendor "Juniper" for product "Virtual Advanced Threat Protection"
< 5.0.6.0
Search vendor "Juniper" for product "Virtual Advanced Threat Protection" and version " < 5.0.6.0"
-
Affected