CVE-2019-0074

A path traversal vulnerability in NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series devices with Next-Generation Routing Engine (NG-RE) allows a local authenticated user to read sensitive system files. This issue only affects NFX150 Series and QFX10K Series, EX9200 Series, MX Series and PTX Series with Next-Generation Routing Engine (NG-RE) which uses vmhost. This issue affects Juniper Networks Junos OS on NFX150 Series and QFX10K, EX9200 Series, MX Series and PTX Series with NG-RE and vmhost: 15.1F versions prior to 15.1F6-S12 16.1 versions starting from 16.1R6 and later releases, including the Service Releases, prior to 16.1R6-S6, 16.1R7-S3; 17.1 versions prior to 17.1R3; 17.2 versions starting from 17.2R1-S3, 17.2R3 and later releases, including the Service Releases, prior to 17.2R3-S1; 17.3 versions starting from 17.3R1-S1, 17.3R2 and later releases, including the Service Releases, prior to 17.3R3-S3; 17.4 versions starting from 17.4R1 and later releases, including the Service Releases, prior to 17.4R1-S6, 17.4R2-S2, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S3; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S2, 18.3R2; 18.4 versions prior to 18.4R1-S1, 18.4R2. This issue does not affect: Juniper Networks Junos OS 15.1 and 16.2.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
juniperCNA
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
VendorProductVersion
juniperjunos
15.1:f1
juniperjunos
15.1:f2
juniperjunos
15.1:f2-s1
juniperjunos
15.1:f2-s2
juniperjunos
15.1:f2-s3
juniperjunos
15.1:f2-s4
juniperjunos
15.1:f3
juniperjunos
15.1:f4
juniperjunos
15.1:f5
juniperjunos
15.1:f6
juniperjunos
15.1:f6-s3
juniperjunos
16.1:r6
juniperjunos
16.1:r6-s1
juniperjunos
16.1:r7
juniperjunos
17.1
juniperjunos
17.1:r1
juniperjunos
17.1:r2-s1
juniperjunos
17.1:r2-s10
juniperjunos
17.1:r2-s2
juniperjunos
17.1:r2-s3
juniperjunos
17.1:r2-s4
juniperjunos
17.1:r2-s5
juniperjunos
17.1:r2-s6
juniperjunos
17.1:r2-s7
juniperjunos
17.2
juniperjunos
17.2:r1-s2
juniperjunos
17.2:r1-s4
juniperjunos
17.2:r1-s7
juniperjunos
17.2:r1-s8
juniperjunos
17.2:r2-s6
juniperjunos
17.2:r2-s7
juniperjunos
17.3:r1-s1
juniperjunos
17.3:r2
juniperjunos
17.3:r2-s1
juniperjunos
17.3:r2-s2
juniperjunos
17.3:r3
juniperjunos
17.4:r1
juniperjunos
17.4:r1-s1
juniperjunos
17.4:r1-s2
juniperjunos
17.4:r1-s4
juniperjunos
17.4:r1-s7
juniperjunos
17.4:r2
juniperjunos
17.4:r2-s1
juniperjunos
18.1
juniperjunos
18.1:r2
juniperjunos
18.1:r2-s1
juniperjunos
18.1:r2-s2
juniperjunos
18.1:r3
juniperjunos
18.1:r3-s2
juniperjunos
18.2
juniperjunos
18.2:r1-s5
juniperjunos
18.2x75:x75
juniperjunos
18.2x75:x75
juniperjunos
18.3
juniperjunos
18.3:r1
juniperjunos
18.3:r1-s1
juniperjunos
18.3:r1-s3
juniperjunos
18.4
juniperjunos
18.4:r1
juniperjunos
18.4:r1-s2
𝑥
= Vulnerable software versions