ID

VAR-202101-1684


CVE

CVE-2021-0204


TITLE

Juniper Networks Junos OS  Information Disclosure Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-002492

DESCRIPTION

A sensitive information disclosure vulnerability in delta-export configuration utility (dexp) of Juniper Networks Junos OS may allow a locally authenticated shell user the ability to create and read database files generated by the dexp utility, including password hashes of local users. Since dexp is shipped with setuid permissions enabled and is owned by the root user, this vulnerability may allow a local privileged user the ability to run dexp with root privileges and access sensitive information in the dexp database. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S8; 15.1X49 versions prior to 15.1X49-D230; 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D34; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S2, 20.2R2. Juniper Networks Junos OS Contains an information disclosure vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Juniper Networks Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware equipment. The operating system provides a secure programming interface and Junos SDK. An escalation of privilege vulnerability exists in Junos OS that could allow an attacker to escalate privileges through SUID bypass restrictions

Trust: 1.71

sources: NVD: CVE-2021-0204 // JVNDB: JVNDB-2021-002492 // VULHUB: VHN-372106

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:17.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:15.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos osscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-002492 // NVD: CVE-2021-0204

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-0204
value: HIGH

Trust: 1.0

sirt@juniper.net: CVE-2021-0204
value: HIGH

Trust: 1.0

NVD: CVE-2021-0204
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202101-1124
value: HIGH

Trust: 0.6

VULHUB: VHN-372106
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-0204
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-372106
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sirt@juniper.net: CVE-2021-0204
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2021-002492
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-372106 // JVNDB: JVNDB-2021-002492 // CNNVD: CNNVD-202101-1124 // NVD: CVE-2021-0204 // NVD: CVE-2021-0204

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.1

problemtype:CWE-250

Trust: 1.0

problemtype:information leak (CWE-200) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-372106 // JVNDB: JVNDB-2021-002492 // NVD: CVE-2021-0204

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202101-1124

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202101-1124

PATCH

title:JSA11114url:https://kb.juniper.net/JSA11114

Trust: 0.8

sources: JVNDB: JVNDB-2021-002492

EXTERNAL IDS

db:NVDid:CVE-2021-0204

Trust: 2.5

db:JUNIPERid:JSA11114

Trust: 1.7

db:JVNDBid:JVNDB-2021-002492

Trust: 0.8

db:CNNVDid:CNNVD-202101-1124

Trust: 0.7

db:AUSCERTid:ESB-2021.0177.2

Trust: 0.6

db:AUSCERTid:ESB-2021.0177

Trust: 0.6

db:VULHUBid:VHN-372106

Trust: 0.1

sources: VULHUB: VHN-372106 // JVNDB: JVNDB-2021-002492 // CNNVD: CNNVD-202101-1124 // NVD: CVE-2021-0204

REFERENCES

url:https://kb.juniper.net/jsa11114

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-0204

Trust: 1.4

url:https://vigilance.fr/vulnerability/junos-os-privilege-escalation-via-suid-binaries-34338

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0177/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0177.2/

Trust: 0.6

sources: VULHUB: VHN-372106 // JVNDB: JVNDB-2021-002492 // CNNVD: CNNVD-202101-1124 // NVD: CVE-2021-0204

SOURCES

db:VULHUBid:VHN-372106
db:JVNDBid:JVNDB-2021-002492
db:CNNVDid:CNNVD-202101-1124
db:NVDid:CVE-2021-0204

LAST UPDATE DATE

2024-08-14T13:54:17.018000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-372106date:2022-09-20T00:00:00
db:JVNDBid:JVNDB-2021-002492date:2021-09-17T07:55:00
db:CNNVDid:CNNVD-202101-1124date:2022-09-21T00:00:00
db:NVDid:CVE-2021-0204date:2022-09-20T17:15:39.827

SOURCES RELEASE DATE

db:VULHUBid:VHN-372106date:2021-01-15T00:00:00
db:JVNDBid:JVNDB-2021-002492date:2021-09-17T00:00:00
db:CNNVDid:CNNVD-202101-1124date:2021-01-13T00:00:00
db:NVDid:CVE-2021-0204date:2021-01-15T18:15:14.637