// For flags

CVE-2020-1666

Junos OS Evolved: 'console log-out-on-disconnect' fails to terminate session on console cable disconnection

Severity Score

6.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. This issue affects all Juniper Networks Junos OS Evolved versions after 18.4R1-EVO, prior to 20.2R1-EVO.

La opción de configuración de la consola del sistema "log-out-on-desconect" en Juniper Networks Junos OS Evolved presenta un fallo al cerrar la sesión de una sesión de la CLI activa cuando el cable de la consola está desconectado. Esto podría permitir a un atacante malicioso con acceso físico a la consola la capacidad de reanudar una sesión interactiva anterior y posiblemente conseguir privilegios administrativos. Este problema afecta a todas las versiones de Juniper Networks Junos OS Evolved versiones posteriores a 18.4R1-EVO, anteriores a 20.2R1-EVO

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-04 CVE Reserved
  • 2020-10-16 CVE Published
  • 2023-07-02 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-284: Improper Access Control
  • CWE-613: Insufficient Session Expiration
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA11063 2021-10-25
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.2
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.2"
r1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.2
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.2"
r2
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.3
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.3"
r2
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4"
r1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4"
r2
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4"
r2-s1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
20.1
Search vendor "Juniper" for product "Junos Os Evolved" and version "20.1"
r1
Affected