#VU21718 Improper validation of integrity check value in Juniper Networks, Inc. products - CVE-2019-0071


Vulnerability identifier: #VU21718

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-0071

CWE-ID: CWE-354

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
EX3400
Hardware solutions / Routers & switches, VoIP, GSM, etc
EX2300-C
Hardware solutions / Routers & switches, VoIP, GSM, etc
EX2300
Hardware solutions / Routers & switches, VoIP, GSM, etc
Juniper Junos OS
Operating systems & Components / Operating system

Vendor: Juniper Networks, Inc.

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an error when the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. A local authenticated user with shell access can install untrusted executable images, elevate privileges and gain full control of the system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

EX3400: All versions

EX2300-C: All versions

EX2300: All versions

Juniper Junos OS: 18.1R1 - 18.1, 18.3R1-S1 - 18.3


External links
https://kb.juniper.net/JSA10978
https://www.juniper.net/documentation/en_US/junos/topics/concept/veriexec.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability