CVE-2020-1614
Summary
| CVE | CVE-2020-1614 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-04-08 20:15:00 UTC |
| Updated | 2020-07-29 19:40:00 UTC |
| Description | A Use of Hard-coded Credentials vulnerability exists in the NFX250 Series for the vSRX Virtual Network Function (VNF) instance, which allows an attacker to take control of the vSRX VNF instance if they have the ability to access an administrative service (e.g. SSH) on the VNF, either locally, or through the network. This issue only affects the NFX250 Series vSRX VNF. No other products or platforms are affected. This issue is only applicable to environments where the vSRX VNF root password has not been configured. This issue affects the Juniper Networks NFX250 Network Services Platform vSRX VNF instance on versions prior to 19.2R1. |
Risk And Classification
Problem Types: CWE-798
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Junos | All | All | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s3 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s4 | All | All |
| Operating System | Juniper | Junos | All | All | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s1 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s2 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s3 | All | All |
| Operating System | Juniper | Junos | 19.2 | r1-s4 | All | All |
| Hardware | Juniper | Nfx250 | - | All | All | All |
| Hardware | Juniper | Nfx250 | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 2020-04 Security Bulletin: NFX250 Series: Hardcoded credentials in the vSRX VNF instance. (CVE-2020-1614) - Juniper Networks | MISC | kb.juniper.net | Vendor Advisory |
| Configuring the Internal Management IP Address of vSRX VNF - Technical Documentation - Support - Juniper Networks | MISC | www.juniper.net | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.