Juniper Junos 12.1x44/12.1x45 Configuration Validator no-validate improper authentication
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.4 | $0-$5k | 0.00 |
Summary
A vulnerability identified as critical has been detected in Juniper Junos 12.1x44/12.1x45. Affected is an unknown function of the component Configuration Validator. The manipulation of the argument no-validate leads to improper authentication. This vulnerability is documented as CVE-2013-6012. The attack can be initiated remotely. There is not any exploit available. You should upgrade the affected component.
Details
A vulnerability was found in Juniper Junos 12.1x44/12.1x45 (Router Operating System). It has been rated as critical. This issue affects some unknown functionality of the component Configuration Validator. The manipulation of the argument no-validate with an unknown input leads to a improper authentication vulnerability. Using CWE to declare the problem leads to CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Juniper Junos 12.1X44 before 12.1.X44-D20 and 12.1X45 before 12.1X45-D15, when the no-validate option is enabled, does not properly handle configuration validation errors during the config commit phase of the boot-up sequence, which allows remote attackers to bypass authentication via unspecified vectors.
The weakness was released 10/09/2013 as JSA10593 as not defined knowledge base article (Website). It is possible to read the advisory at kb.juniper.net. The identification of this vulnerability is CVE-2013-6012 since 10/04/2013. The attack may be initiated remotely. A simple authentication is required for exploitation. Technical details of the vulnerability are known, but there is no available exploit. The advisory points out:
A configuration validation error during the config commit phase of the boot-up sequence may leave the device with a partial configuration, allowing for unauthenticated access.
The vulnerability scanner Nessus provides a plugin with the ID 70478 (Juniper Junos SRX Series Unauthenticated Access (JSA10593)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Junos Local Security Checks.
Upgrading to version 12.1X45-D15 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (88324), Tenable (70478), SecurityFocus (BID 63389†), OSVDB (98378†) and Vulnerability Center (SBV-42000†). Entries connected to this vulnerability are available at VDB-10690, VDB-10689, VDB-10688 and VDB-10687. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.juniper.net/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.8VulDB Meta Temp Score: 8.4
VulDB Base Score: 8.8
VulDB Temp Score: 8.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 70478
Nessus Name: Juniper Junos SRX Series Unauthenticated Access (JSA10593)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Junos 12.1X45-D15
Timeline
10/04/2013 🔍10/09/2013 🔍
10/09/2013 🔍
10/16/2013 🔍
10/17/2013 🔍
10/17/2013 🔍
10/20/2013 🔍
10/28/2013 🔍
10/28/2013 🔍
05/26/2021 🔍
Sources
Vendor: juniper.netAdvisory: JSA10593
Status: Not defined
Confirmation: 🔍
CVE: CVE-2013-6012 (🔍)
GCVE (CVE): GCVE-0-2013-6012
GCVE (VulDB): GCVE-100-10691
IAVM: 🔍
X-Force: 88324
SecurityFocus: 63389
OSVDB: 98378
Vulnerability Center: 42000 - Juniper JunOS SRX Series Remote Security Bypass During Software Upgrade due to Commit Failure, High
See also: 🔍
Entry
Created: 10/16/2013 09:55Updated: 05/26/2021 18:04
Changes: 10/16/2013 09:55 (75), 04/29/2019 07:03 (1), 05/26/2021 17:56 (3), 05/26/2021 18:04 (1)
Complete: 🔍
Committer: olku
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.