CVE-2023-44187
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
11/10/2023
Last modified:
19/10/2023
Description
An Exposure of Sensitive Information vulnerability in the &#39;file copy&#39; command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system.<br />
<br />
This issue affects Juniper Networks Junos OS Evolved:<br />
* All versions prior to 20.4R3-S7-EVO;<br />
* 21.1 versions 21.1R1-EVO and later;<br />
* 21.2 versions prior to 21.2R3-S5-EVO;<br />
* 21.3 versions prior to 21.3R3-S4-EVO;<br />
* 21.4 versions prior to 21.4R3-S4-EVO;<br />
* 22.1 versions prior to 22.1R3-S2-EVO;<br />
* 22.2 versions prior to 22.2R2-EVO.<br />
<br />
<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* | 20.4 (excluding) | |
| cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



