Vulnerability Details CVE-2020-1618
On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password. This issue might only occur in certain scenarios: • At the first reboot after performing device factory reset using the command “request system zeroize”; or • A temporary moment during the first reboot after the software upgrade when the device configured in Virtual Chassis mode. This issue affects Juniper Networks Junos OS on EX and QFX Series: 14.1X53 versions prior to 14.1X53-D53; 15.1 versions prior to 15.1R7-S4; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S4; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R2; 18.3 versions prior to 18.3R1-S7, 18.3R2. This issue does not affect Juniper Networks Junos OS 12.3.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 11.4%
CVSS Severity
CVSS v3 Score 6.3
CVSS v2 Score 6.9
Products affected by CVE-2020-1618
-
cpe:2.3:h:juniper:ex2300-c:-
-
cpe:2.3:h:juniper:ex2300:-
-
cpe:2.3:h:juniper:ex3400:-
-
cpe:2.3:h:juniper:ex4300:-
-
cpe:2.3:h:juniper:ex4600:-
-
cpe:2.3:h:juniper:ex4650:-
-
cpe:2.3:h:juniper:qfx10002:-
-
cpe:2.3:h:juniper:qfx10008:-
-
cpe:2.3:h:juniper:qfx10016:-
-
cpe:2.3:h:juniper:qfx5100:-
-
cpe:2.3:h:juniper:qfx5110:-
-
cpe:2.3:h:juniper:qfx5120:-
-
cpe:2.3:h:juniper:qfx5200:-
-
cpe:2.3:h:juniper:qfx5210:-
-
cpe:2.3:h:juniper:qfx5220:-
-
cpe:2.3:o:juniper:junos:14.1x53
-
cpe:2.3:o:juniper:junos:15.1
-
cpe:2.3:o:juniper:junos:15.1x53
-
cpe:2.3:o:juniper:junos:16.1
-
cpe:2.3:o:juniper:junos:17.1
-
cpe:2.3:o:juniper:junos:17.2
-
cpe:2.3:o:juniper:junos:17.3
-
cpe:2.3:o:juniper:junos:17.4
-
cpe:2.3:o:juniper:junos:18.1
-
cpe:2.3:o:juniper:junos:18.2
-
cpe:2.3:o:juniper:junos:18.3