ID

VAR-201807-0311


CVE

CVE-2018-0026


TITLE

Juniper Networks Junos OS Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-007995

DESCRIPTION

After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it does not show the applied firewall filter. The correct output should show the applied firewall filter, for example: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Input Filters: FIREWAL_FILTER_NAME-<interface_name> This issue affects firewall filters for every address family. Affected releases are Juniper Networks Junos OS: 15.1R4, 15.1R5, 15.1R6 and SRs based on these MRs. 15.1X8 versions prior to 15.1X8.3. Juniper Junos is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may aid in further attacks. The operating system provides a secure programming interface and Junos SDK

Trust: 1.98

sources: NVD: CVE-2018-0026 // JVNDB: JVNDB-2018-007995 // BID: 104720 // VULHUB: VHN-118228

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:15.1x8

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.6

vendor:junipermodel:junos osscope:eqversion:15.1r4

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x8.3

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1r5

Trust: 0.8

vendor:junipermodel:junos osscope:ltversion:15.1x8

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1r6

Trust: 0.8

vendor:junipermodel:junos 15.1r6scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r5scope: - version: -

Trust: 0.3

vendor:junipermodel:junos 15.1r4scope: - version: -

Trust: 0.3

vendor:junipermodel:junosscope:neversion:15.1x8.3

Trust: 0.3

vendor:junipermodel:junos 15.1r7scope:neversion: -

Trust: 0.3

sources: BID: 104720 // JVNDB: JVNDB-2018-007995 // CNNVD: CNNVD-201807-1089 // NVD: CVE-2018-0026

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0026
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2018-0026
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-0026
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201807-1089
value: HIGH

Trust: 0.6

VULHUB: VHN-118228
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0026
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118228
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0026
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sirt@juniper.net: CVE-2018-0026
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-118228 // JVNDB: JVNDB-2018-007995 // CNNVD: CNNVD-201807-1089 // NVD: CVE-2018-0026 // NVD: CVE-2018-0026

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-254

Trust: 0.9

sources: VULHUB: VHN-118228 // JVNDB: JVNDB-2018-007995 // NVD: CVE-2018-0026

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-1089

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201807-1089

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007995

PATCH

title:JSA10859url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10859&actp=METADATA

Trust: 0.8

title:Juniper Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82105

Trust: 0.6

sources: JVNDB: JVNDB-2018-007995 // CNNVD: CNNVD-201807-1089

EXTERNAL IDS

db:NVDid:CVE-2018-0026

Trust: 2.8

db:JUNIPERid:JSA10859

Trust: 2.0

db:BIDid:104720

Trust: 2.0

db:SECTRACKid:1041315

Trust: 1.7

db:JVNDBid:JVNDB-2018-007995

Trust: 0.8

db:CNNVDid:CNNVD-201807-1089

Trust: 0.7

db:VULHUBid:VHN-118228

Trust: 0.1

sources: VULHUB: VHN-118228 // BID: 104720 // JVNDB: JVNDB-2018-007995 // CNNVD: CNNVD-201807-1089 // NVD: CVE-2018-0026

REFERENCES

url:http://www.securityfocus.com/bid/104720

Trust: 1.7

url:https://kb.juniper.net/jsa10859

Trust: 1.7

url:http://www.securitytracker.com/id/1041315

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0026

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0026

Trust: 0.8

url:http://www.juniper.net/

Trust: 0.3

url:http://www.juniper.net/us/en/products-services/nos/junos/

Trust: 0.3

url:https://kb.juniper.net/infocenter/index?page=content&id=jsa10859

Trust: 0.3

sources: VULHUB: VHN-118228 // BID: 104720 // JVNDB: JVNDB-2018-007995 // CNNVD: CNNVD-201807-1089 // NVD: CVE-2018-0026

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 104720

SOURCES

db:VULHUBid:VHN-118228
db:BIDid:104720
db:JVNDBid:JVNDB-2018-007995
db:CNNVDid:CNNVD-201807-1089
db:NVDid:CVE-2018-0026

LAST UPDATE DATE

2024-08-14T15:13:08.082000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118228date:2019-10-09T00:00:00
db:BIDid:104720date:2018-07-11T00:00:00
db:JVNDBid:JVNDB-2018-007995date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-1089date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0026date:2019-10-09T23:31:01.127

SOURCES RELEASE DATE

db:VULHUBid:VHN-118228date:2018-07-11T00:00:00
db:BIDid:104720date:2018-07-11T00:00:00
db:JVNDBid:JVNDB-2018-007995date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-1089date:2018-07-12T00:00:00
db:NVDid:CVE-2018-0026date:2018-07-11T18:29:00.293