Lucene search

K
cveJuniperCVE-2021-0220
HistoryJan 15, 2021 - 6:15 p.m.

CVE-2021-0220

2021-01-1518:15:15
CWE-522
CWE-257
juniper
web.nvd.nist.gov
49
2
junos space
network management platform
shared secrets
arbitrary code execution
xss
credentials
juniper networks
cve-2021-0220

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

28.8%

The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.

Affected configurations

Nvd
Node
juniperjunos_spaceMatch1.0
OR
juniperjunos_spaceMatch1.1
OR
juniperjunos_spaceMatch1.2
OR
juniperjunos_spaceMatch1.3
OR
juniperjunos_spaceMatch1.4
OR
juniperjunos_spaceMatch2.0
OR
juniperjunos_spaceMatch11.1
OR
juniperjunos_spaceMatch11.2
OR
juniperjunos_spaceMatch11.3
OR
juniperjunos_spaceMatch11.4
OR
juniperjunos_spaceMatch12.1
OR
juniperjunos_spaceMatch12.2
OR
juniperjunos_spaceMatch12.3
OR
juniperjunos_spaceMatch13.1-
OR
juniperjunos_spaceMatch13.1r1.8
OR
juniperjunos_spaceMatch13.3r3
OR
juniperjunos_spaceMatch14.1-
OR
juniperjunos_spaceMatch15.1-
OR
juniperjunos_spaceMatch15.1r2
OR
juniperjunos_spaceMatch15.1r4
OR
juniperjunos_spaceMatch15.2-
OR
juniperjunos_spaceMatch16.1-
OR
juniperjunos_spaceMatch17.1-
OR
juniperjunos_spaceMatch17.2-
OR
juniperjunos_spaceMatch17.2r1.4
OR
juniperjunos_spaceMatch18.1-
OR
juniperjunos_spaceMatch18.1r1
OR
juniperjunos_spaceMatch18.2-
OR
juniperjunos_spaceMatch18.3-
OR
juniperjunos_spaceMatch18.4-
OR
juniperjunos_spaceMatch19.1-
OR
juniperjunos_spaceMatch15.1r1
OR
juniperjunos_spaceMatch15.2r1
OR
juniperjunos_spaceMatch16.1
OR
juniperjunos_spaceMatch17.2
OR
juniperjunos_spaceMatch18.1r1
OR
juniperjunos_spaceMatch18.2r1
OR
juniperjunos_spaceMatch18.3r1
OR
juniperjunos_spaceMatch18.4r1
OR
juniperjunos_spaceMatch19.1r1
OR
juniperjunos_spaceMatch19.2r1
OR
juniperjunos_spaceMatch19.3r1
OR
juniperjunos_spaceMatch19.4r1
OR
juniperjunos_spaceMatch20.1r1
VendorProductVersionCPE
juniperjunos_space1.0cpe:2.3:a:juniper:junos_space:1.0:*:*:*:*:*:*:*
juniperjunos_space1.1cpe:2.3:a:juniper:junos_space:1.1:*:*:*:*:*:*:*
juniperjunos_space1.2cpe:2.3:a:juniper:junos_space:1.2:*:*:*:*:*:*:*
juniperjunos_space1.3cpe:2.3:a:juniper:junos_space:1.3:*:*:*:*:*:*:*
juniperjunos_space1.4cpe:2.3:a:juniper:junos_space:1.4:*:*:*:*:*:*:*
juniperjunos_space2.0cpe:2.3:a:juniper:junos_space:2.0:*:*:*:*:*:*:*
juniperjunos_space11.1cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*
juniperjunos_space11.2cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*
juniperjunos_space11.3cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*
juniperjunos_space11.4cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*
Rows per page:
1-10 of 441

CNA Affected

[
  {
    "product": "Junos Space",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "20.3R1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

28.8%

Related for CVE-2021-0220