ID

VAR-201807-0318


CVE

CVE-2018-0035


TITLE

Junos OS Vulnerabilities related to security functions

Trust: 0.8

sources: JVNDB: JVNDB-2018-007991

DESCRIPTION

QFX5200 and QFX10002 devices that have been shipped with Junos OS 15.1X53-D21, 15.1X53-D30, 15.1X53-D31, 15.1X53-D32, 15.1X53-D33 and 15.1X53-D60 or have been upgraded to these releases using the .bin or .iso images may contain an unintended additional Open Network Install Environment (ONIE) partition. This additional partition allows the superuser to reboot to the ONIE partition which will wipe out the content of the Junos partition and its configuration. Once rebooted, the ONIE partition will not have root password configured, thus any user can access the console or SSH, using an IP address acquired from DHCP, as root without password. Once the device has been shipped or upgraded with the ONIE partition installed, the issue will persist. Simply upgrading to higher release via the CLI will not resolve the issue. No other Juniper Networks products or platforms are affected by this issue. Junos OS Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Junos OS is a set of operating systems running on it. The following releases are affected: Junos OS Release 15.1X53-D21, Release 15.1X53-D30, Release 15.1X53-D31, Release 15.1X53-D32, Release 15.1X53-D33, Release 15.1X53-D60

Trust: 1.8

sources: NVD: CVE-2018-0035 // JVNDB: JVNDB-2018-007991 // VULHUB: VHN-118237 // VULMON: CVE-2018-0035

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:15.1x53

Trust: 1.6

vendor:junipermodel:junos osscope:eqversion:15.1x53-d21

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d30

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d31

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d32

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d33

Trust: 0.8

vendor:junipermodel:junos osscope:eqversion:15.1x53-d60

Trust: 0.8

sources: JVNDB: JVNDB-2018-007991 // CNNVD: CNNVD-201807-1082 // NVD: CVE-2018-0035

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0035
value: CRITICAL

Trust: 1.0

sirt@juniper.net: CVE-2018-0035
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-0035
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201807-1082
value: CRITICAL

Trust: 0.6

VULHUB: VHN-118237
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0035
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0035
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-118237
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0035
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sirt@juniper.net: CVE-2018-0035
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-118237 // VULMON: CVE-2018-0035 // JVNDB: JVNDB-2018-007991 // CNNVD: CNNVD-201807-1082 // NVD: CVE-2018-0035 // NVD: CVE-2018-0035

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-254

Trust: 0.9

sources: VULHUB: VHN-118237 // JVNDB: JVNDB-2018-007991 // NVD: CVE-2018-0035

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-1082

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201807-1082

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-007991

PATCH

title:JSA10869url:https://kb.juniper.net/JSA10869

Trust: 0.8

title:Juniper QFX5200 and QFX10002 Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82098

Trust: 0.6

sources: JVNDB: JVNDB-2018-007991 // CNNVD: CNNVD-201807-1082

EXTERNAL IDS

db:NVDid:CVE-2018-0035

Trust: 2.6

db:JUNIPERid:JSA10869

Trust: 1.8

db:SECTRACKid:1041336

Trust: 1.8

db:JVNDBid:JVNDB-2018-007991

Trust: 0.8

db:CNNVDid:CNNVD-201807-1082

Trust: 0.7

db:VULHUBid:VHN-118237

Trust: 0.1

db:VULMONid:CVE-2018-0035

Trust: 0.1

sources: VULHUB: VHN-118237 // VULMON: CVE-2018-0035 // JVNDB: JVNDB-2018-007991 // CNNVD: CNNVD-201807-1082 // NVD: CVE-2018-0035

REFERENCES

url:https://kb.juniper.net/jsa10869

Trust: 1.8

url:http://www.securitytracker.com/id/1041336

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0035

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0035

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-118237 // VULMON: CVE-2018-0035 // JVNDB: JVNDB-2018-007991 // CNNVD: CNNVD-201807-1082 // NVD: CVE-2018-0035

SOURCES

db:VULHUBid:VHN-118237
db:VULMONid:CVE-2018-0035
db:JVNDBid:JVNDB-2018-007991
db:CNNVDid:CNNVD-201807-1082
db:NVDid:CVE-2018-0035

LAST UPDATE DATE

2024-11-23T23:02:07.635000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118237date:2019-10-09T00:00:00
db:VULMONid:CVE-2018-0035date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2018-007991date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-1082date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0035date:2024-11-21T03:37:24.253

SOURCES RELEASE DATE

db:VULHUBid:VHN-118237date:2018-07-11T00:00:00
db:VULMONid:CVE-2018-0035date:2018-07-11T00:00:00
db:JVNDBid:JVNDB-2018-007991date:2018-10-04T00:00:00
db:CNNVDid:CNNVD-201807-1082date:2018-07-12T00:00:00
db:NVDid:CVE-2018-0035date:2018-07-11T18:29:00.683