CVE-2020-1666
16.10.2020, 21:15
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. This issue affects all Juniper Networks Junos OS Evolved versions after 18.4R1-EVO, prior to 20.2R1-EVO.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos_os_evolved | 19.2:r1 |
juniper | junos_os_evolved | 19.2:r2 |
juniper | junos_os_evolved | 19.3:r2 |
juniper | junos_os_evolved | 19.4:r1 |
juniper | junos_os_evolved | 19.4:r2 |
juniper | junos_os_evolved | 19.4:r2-s1 |
juniper | junos_os_evolved | 20.1:r1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-613 - Insufficient Session ExpirationAccording to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."