CVE-2020-1615
Severity CVSS v4.0:
Pending analysis
Type:
CWE-798
Use of Hard-coded Credentials
Publication date:
08/04/2020
Last modified:
05/02/2021
Description
The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the vMX instance without authorization. This issue affects Juniper Networks Junos OS: 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on vMX; 17.2 versions prior to 17.2R3-S3 on vMX; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on vMX; 17.4 versions prior to 17.4R2-S9, 17.4R3 on vMX; 18.1 versions prior to 18.1R3-S9 on vMX; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on vMX; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D60 on vMX; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1 on vMX; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on vMX; 19.1 versions prior to 19.1R1-S4, 19.1R2, 19.1R3 on vMX; 19.2 versions prior to 19.2R1-S3, 19.2R2 on vMX; 19.3 versions prior to 19.3R1-S1, 19.3R2 on vMX.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.1:r3-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



