Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-0039

If REST API is enabled, the Junos OS login credentials are vulnerable to brute force attacks. The high default connection limit of the REST API may allow an attacker to brute-force passwords using advanced scripting techniques. Additionally, administrators who do not enforce a strong password policy can increase the likelihood of success from brute force attacks. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D495, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.2 versions prior to 18.2R1-S5; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R1-S1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 51.9%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 4.3
Products affected by CVE-2019-0039
  • Juniper » Junos » Version: 14.1x53
    cpe:2.3:o:juniper:junos:14.1x53
  • Juniper » Junos » Version: 14.1x53-d10
    cpe:2.3:o:juniper:junos:14.1x53-d10
  • Juniper » Junos » Version: 14.1x53-d15
    cpe:2.3:o:juniper:junos:14.1x53-d15
  • Juniper » Junos » Version: 14.1x53-d25
    cpe:2.3:o:juniper:junos:14.1x53-d25
  • Juniper » Junos » Version: 14.1x53-d26
    cpe:2.3:o:juniper:junos:14.1x53-d26
  • Juniper » Junos » Version: 14.1x53-d27
    cpe:2.3:o:juniper:junos:14.1x53-d27
  • Juniper » Junos » Version: 14.1x53-d30
    cpe:2.3:o:juniper:junos:14.1x53-d30
  • Juniper » Junos » Version: 14.1x53-d35
    cpe:2.3:o:juniper:junos:14.1x53-d35
  • Juniper » Junos » Version: 15.1
    cpe:2.3:o:juniper:junos:15.1
  • Juniper » Junos » Version: 15.1f6-s1
    cpe:2.3:o:juniper:junos:15.1f6-s1
  • Juniper » Junos » Version: 15.1f6-s10
    cpe:2.3:o:juniper:junos:15.1f6-s10
  • Juniper » Junos » Version: 15.1f6-s11
    cpe:2.3:o:juniper:junos:15.1f6-s11
  • Juniper » Junos » Version: 15.1f6-s2
    cpe:2.3:o:juniper:junos:15.1f6-s2
  • Juniper » Junos » Version: 15.1f6-s4
    cpe:2.3:o:juniper:junos:15.1f6-s4
  • Juniper » Junos » Version: 15.1f6-s5
    cpe:2.3:o:juniper:junos:15.1f6-s5
  • Juniper » Junos » Version: 15.1f6-s6
    cpe:2.3:o:juniper:junos:15.1f6-s6
  • Juniper » Junos » Version: 15.1f6-s7
    cpe:2.3:o:juniper:junos:15.1f6-s7
  • Juniper » Junos » Version: 15.1f6-s8
    cpe:2.3:o:juniper:junos:15.1f6-s8
  • Juniper » Junos » Version: 15.1f6-s9
    cpe:2.3:o:juniper:junos:15.1f6-s9
  • Juniper » Junos » Version: 15.1x49
    cpe:2.3:o:juniper:junos:15.1x49
  • Juniper » Junos » Version: 15.1x49-d140
    cpe:2.3:o:juniper:junos:15.1x49-d140
  • Juniper » Junos » Version: 15.1x49-d150
    cpe:2.3:o:juniper:junos:15.1x49-d150
  • Juniper » Junos » Version: 15.1x49-d30
    cpe:2.3:o:juniper:junos:15.1x49-d30
  • Juniper » Junos » Version: 15.1x49-d60
    cpe:2.3:o:juniper:junos:15.1x49-d60
  • Juniper » Junos » Version: 15.1x53
    cpe:2.3:o:juniper:junos:15.1x53
  • Juniper » Junos » Version: 15.1x53-d235
    cpe:2.3:o:juniper:junos:15.1x53-d235
  • Juniper » Junos » Version: 15.1x53-d50
    cpe:2.3:o:juniper:junos:15.1x53-d50
  • Juniper » Junos » Version: 15.1x53-d51
    cpe:2.3:o:juniper:junos:15.1x53-d51
  • Juniper » Junos » Version: 15.1x53-d52
    cpe:2.3:o:juniper:junos:15.1x53-d52
  • Juniper » Junos » Version: 15.1x53-d55
    cpe:2.3:o:juniper:junos:15.1x53-d55
  • Juniper » Junos » Version: 15.1x53-d57
    cpe:2.3:o:juniper:junos:15.1x53-d57
  • Juniper » Junos » Version: 15.1x53-d58
    cpe:2.3:o:juniper:junos:15.1x53-d58
  • Juniper » Junos » Version: 15.1x53-d59
    cpe:2.3:o:juniper:junos:15.1x53-d59
  • Juniper » Junos » Version: 15.1x53-d69
    cpe:2.3:o:juniper:junos:15.1x53-d69
  • Juniper » Junos » Version: 16.1
    cpe:2.3:o:juniper:junos:16.1
  • Juniper » Junos » Version: 16.1x65
    cpe:2.3:o:juniper:junos:16.1x65
  • Juniper » Junos » Version: 16.2
    cpe:2.3:o:juniper:junos:16.2
  • Juniper » Junos » Version: 17.1
    cpe:2.3:o:juniper:junos:17.1
  • Juniper » Junos » Version: 17.2
    cpe:2.3:o:juniper:junos:17.2
  • Juniper » Junos » Version: 17.3
    cpe:2.3:o:juniper:junos:17.3
  • Juniper » Junos » Version: 17.3r3
    cpe:2.3:o:juniper:junos:17.3r3
  • Juniper » Junos » Version: 17.4
    cpe:2.3:o:juniper:junos:17.4
  • Juniper » Junos » Version: 18.1
    cpe:2.3:o:juniper:junos:18.1
  • Juniper » Junos » Version: 18.1r
    cpe:2.3:o:juniper:junos:18.1r
  • Juniper » Junos » Version: 18.1r2
    cpe:2.3:o:juniper:junos:18.1r2
  • Juniper » Junos » Version: 18.2
    cpe:2.3:o:juniper:junos:18.2
  • Juniper » Junos » Version: 18.2r
    cpe:2.3:o:juniper:junos:18.2r
  • Juniper » Junos » Version: 18.2r1
    cpe:2.3:o:juniper:junos:18.2r1
  • Juniper » Junos » Version: 18.2x75
    cpe:2.3:o:juniper:junos:18.2x75
  • Juniper » Junos » Version: 18.2x75-d10
    cpe:2.3:o:juniper:junos:18.2x75-d10
  • Juniper » Junos » Version: 18.3
    cpe:2.3:o:juniper:junos:18.3
  • Juniper » Junos » Version: 18.3r
    cpe:2.3:o:juniper:junos:18.3r


Contact Us

Shodan ® - All rights reserved