Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106133
Kategorie:JunOS Local Security Checks
Titel:Junos SRX Series: Possible Unauthenticated Root Login Vulnerability
Zusammenfassung:Junos OS on SRX series is prone to a possible unauthenticated;root login vulnerability
Beschreibung:Summary:
Junos OS on SRX series is prone to a possible unauthenticated
root login vulnerability

Vulnerability Insight:
Using the 'request system software' command with the 'partition' option
on an SRX Series device upgrading to Junos OS 12.1X46 can leave the system in a state where root CLI login
is allowed without a password due to the system reverting to a 'safe mode' authentication triggered by the
failed upgrade. Additionally, valid authentication credentials fail to work due to the same issue. Only root
with no password will work.

This issue only affects SRX Series devices upgraded to Junos OS 12.1X46 releases. No other platform or version
of Junos OS is affected by this vulnerability, and no other Juniper Networks products or platforms are affected
by this issue.

Vulnerability Impact:
A local attacker may gain root access.

Affected Software/OS:
Junos OS 12.1X46 on SRX Series

Solution:
New builds of Junos OS software are available from Juniper.
As a workaround avoid using the 'partition' option when upgrading an SRX Series device to Junos OS 12.1X46
prior to 12.1X46-D50.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-1278
BugTraq ID: 91757
http://www.securityfocus.com/bid/91757
http://www.securitytracker.com/id/1036307
CopyrightThis script is Copyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.