"value":"The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2."
"value":"CWE-256 Unprotected Storage of Credentials"
}
]
}
]
},
"references":{
"reference_data":[
{
"name":"https://kb.juniper.net/JSA11066",
"refsource":"CONFIRM",
"url":"https://kb.juniper.net/JSA11066"
}
]
},
"solution":[
{
"lang":"eng",
"value":"Junos OS now stores local password hashes in the protected /etc/shadow file.\n\nThe following software releases have been updated to resolve this specific issue: Junos OS 19.4R3, 20.1R1-S4, 20.1R2, 20.2R1, and all subsequent releases.\n"
}
],
"source":{
"advisory":"JSA11066",
"defect":[
"1462556"
],
"discovery":"INTERNAL"
},
"work_around":[
{
"lang":"eng",
"value":"Use access lists or firewall filters to limit access to the device only from trusted hosts.\nLimit shell access to only trusted system administrators."