Configuration error in Juniper Junos OS - CVE-2018-0023

 

Configuration error in Juniper Junos OS - CVE-2018-0023

Published: April 17, 2018


Vulnerability identifier: #VU11850
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0023
CWE-ID: CWE-16
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Juniper Networks, Inc.
Affected software:
Juniper Junos OS

Detailed vulnerability description

The vulnerability allows a local unauthenticated attacker to obtain potentially sensitive information and write arbitrary files on the target system.

The weakness exists due to the default configuration and sample files of JSNAPy automation tool are created world writable. A local attacker can alter the files under the directory including inserting operations not intended by the package maintainer, system administrator, or other users.

How to mitigate CVE-2018-0023

Update to version 1.3.

Sources