vMX configuration vulnerability in Juniper Networks Junos OS

vMX configuration vulnerability in Juniper Networks Junos OS

Component Affected
• Juniper Networks Junos OS:

  1. o 17.1 versions prior to 17.1R2 -S11, 17.1R3-52 on vMX;
  2. o 17.2 versions prior to 17.2R3-53 on vMX;
  3. o 17.3 versions prior to 17.3R2 -S5, 17.3R3-57 on vMX;
  4. o 17.4 versions prior to 17.4R2 -S9, 17.4R3 on vMX;
  5. o 18.1 versions prior to 18.1R3-59 on vMX;
  6. o 18.2 versions prior to 18.2R2 -S7, 18.2R3-53 on vMX;
  7. o 18.2X75 versions prior to 18.2X75 -D420,
  8. o 18.2X75 -D60 on vMX;
  9. o 18.3 versions prior to 18.3R1 -S7, 18.3R2 -S3,
  10. o 18.3R3 -S1 on vMX;
  11. o 18.4 versions prior to 18.4R1 -S5, 18.4R2 -S3,
  12. o 18.4R3 on vMX;
  13. o 19.1 versions prior to 19.1R1 -S4, 19.1R2, 19.1R3 on vMX;
  14. o 19.2 versions prior to 19.2R1 -S3, 19.2R2 on vMX;
  15. o 19.3 versions prior to 19.3R1 -S1, 19.3R2 on vMX.


Overview
A vulnerability has been reported in vMX installations which could allow an attacker to access the vMX instance without
authorization.

Description
A vulnerability exists in the factory configuration for vMX installation which includes default credentials for the root account
that could allow an attacker to exploit the credentials without proper modification of these default credentials by the
administrator.
Successful exploitation of this vulnerability could allow an attacker to exploit these credentials and access the vMX instance
without authorization.

Comments

Popular posts from this blog

CAREER TECHNOLOGY CYBER SECURITY INDIA PVT LTD.

Cyber Security Audits

Some Dark web Links