CVE-2023-44187
11.10.2023, 21:15
An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system. This issue affects Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S7-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S5-EVO; * 21.3 versions prior to 21.3R3-S4-EVO; * 21.4 versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S2-EVO; * 22.2 versions prior to 22.2R2-EVO.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos_os_evolved | 𝑥 < 20.4 |
juniper | junos_os_evolved | 20.4 |
juniper | junos_os_evolved | 20.4:r1 |
juniper | junos_os_evolved | 20.4:r1-s1 |
juniper | junos_os_evolved | 20.4:r1-s2 |
juniper | junos_os_evolved | 20.4:r2 |
juniper | junos_os_evolved | 20.4:r2-s1 |
juniper | junos_os_evolved | 20.4:r2-s2 |
juniper | junos_os_evolved | 20.4:r2-s3 |
juniper | junos_os_evolved | 20.4:r3 |
juniper | junos_os_evolved | 20.4:r3-s1 |
juniper | junos_os_evolved | 20.4:r3-s2 |
juniper | junos_os_evolved | 20.4:r3-s3 |
juniper | junos_os_evolved | 20.4:r3-s4 |
juniper | junos_os_evolved | 20.4:r3-s5 |
juniper | junos_os_evolved | 20.4:r3-s6 |
juniper | junos_os_evolved | 21.1 |
juniper | junos_os_evolved | 21.1:r1 |
juniper | junos_os_evolved | 21.1:r1-s1 |
juniper | junos_os_evolved | 21.1:r2 |
juniper | junos_os_evolved | 21.1:r3 |
juniper | junos_os_evolved | 21.1:r3-s1 |
juniper | junos_os_evolved | 21.1:r3-s2 |
juniper | junos_os_evolved | 21.1:r3-s3 |
juniper | junos_os_evolved | 21.2 |
juniper | junos_os_evolved | 21.2:r1 |
juniper | junos_os_evolved | 21.2:r1-s1 |
juniper | junos_os_evolved | 21.2:r1-s2 |
juniper | junos_os_evolved | 21.2:r2 |
juniper | junos_os_evolved | 21.2:r2-s1 |
juniper | junos_os_evolved | 21.2:r2-s2 |
juniper | junos_os_evolved | 21.2:r3 |
juniper | junos_os_evolved | 21.2:r3-s1 |
juniper | junos_os_evolved | 21.2:r3-s2 |
juniper | junos_os_evolved | 21.2:r3-s3 |
juniper | junos_os_evolved | 21.2:r3-s4 |
juniper | junos_os_evolved | 21.3 |
juniper | junos_os_evolved | 21.3:r1 |
juniper | junos_os_evolved | 21.3:r1-s1 |
juniper | junos_os_evolved | 21.3:r2 |
juniper | junos_os_evolved | 21.3:r2-s1 |
juniper | junos_os_evolved | 21.3:r2-s2 |
juniper | junos_os_evolved | 21.3:r3 |
juniper | junos_os_evolved | 21.3:r3-s1 |
juniper | junos_os_evolved | 21.3:r3-s2 |
juniper | junos_os_evolved | 21.3:r3-s3 |
juniper | junos_os_evolved | 21.4 |
juniper | junos_os_evolved | 21.4:r1 |
juniper | junos_os_evolved | 21.4:r1-s1 |
juniper | junos_os_evolved | 21.4:r1-s2 |
juniper | junos_os_evolved | 21.4:r2 |
juniper | junos_os_evolved | 21.4:r2-s1 |
juniper | junos_os_evolved | 21.4:r2-s2 |
juniper | junos_os_evolved | 21.4:r3 |
juniper | junos_os_evolved | 21.4:r3-s1 |
juniper | junos_os_evolved | 21.4:r3-s2 |
juniper | junos_os_evolved | 21.4:r3-s3 |
juniper | junos_os_evolved | 22.1:r1 |
juniper | junos_os_evolved | 22.1:r1-s1 |
juniper | junos_os_evolved | 22.1:r1-s2 |
juniper | junos_os_evolved | 22.1:r2 |
juniper | junos_os_evolved | 22.1:r2-s1 |
juniper | junos_os_evolved | 22.1:r3 |
juniper | junos_os_evolved | 22.1:r3-s1 |
juniper | junos_os_evolved | 22.2:r1 |
juniper | junos_os_evolved | 22.2:r1-s1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration