{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-44187", "ASSIGNER": "sirt@juniper.net", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n * All versions prior to 20.4R3-S7-EVO;\n * 21.1 versions 21.1R1-EVO and later;\n * 21.2 versions prior to 21.2R3-S5-EVO;\n * 21.3 versions prior to 21.3R3-S4-EVO;\n * 21.4 versions prior to 21.4R3-S4-EVO;\n * 22.1 versions prior to 22.1R3-S2-EVO;\n * 22.2 versions prior to 22.2R2-EVO.\n\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "cweId": "CWE-200" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Juniper Networks", "product": { "product_data": [ { "product_name": "Junos OS Evolved", "version": { "version_data": [ { "version_affected": "<", "version_name": "0", "version_value": "20.4R3-S7-EVO" }, { "version_affected": "<", "version_name": "21.1R1", "version_value": "21.1*" }, { "version_affected": "<", "version_name": "21.2", "version_value": "21.2R3-S5-EVO" }, { "version_affected": "<", "version_name": "21.3", "version_value": "21.3R3-S4-EVO" }, { "version_affected": "<", "version_name": "21.4", "version_value": "21.4R3-S4-EVO" }, { "version_affected": "<", "version_name": "22.1", "version_value": "22.1R3-S2-EVO" }, { "version_affected": "<", "version_name": "22.2", "version_value": "22.2R2-EVO" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://supportportal.juniper.net/JSA73151", "refsource": "MISC", "name": "https://supportportal.juniper.net/JSA73151" } ] }, "generator": { "engine": "Vulnogram 0.1.0-av217" }, "source": { "advisory": "JSA73151", "defect": [ "1639609" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "

Restrict Junos OS Evolved shell access to trusted users only.

Avoid or disallow the use of the 'file copy' command.

" } ], "value": "Restrict Junos OS Evolved shell access to trusted users only.\n\nAvoid or disallow the use of the 'file copy' command.\n\n" } ], "exploit": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" } ], "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" } ], "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "

The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S7-EVO, 21.2R3-S5-EVO, 21.3R3-S4-EVO, 21.4R3-S4-EVO, 22.1R3-S2-EVO, 22.2R2-EVO, 22.3R1-EVO, and all subsequent releases.

" } ], "value": "The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.4R3-S7-EVO, 21.2R3-S5-EVO, 21.3R3-S4-EVO, 21.4R3-S4-EVO, 22.1R3-S2-EVO, 22.2R2-EVO, 22.3R1-EVO, and all subsequent releases.\n\n" } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } ] } }