6.9
CVSSv2

CVE-2015-7751

Published: 19/10/2015 Updated: 20/10/2015
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Juniper Junos OS prior to 12.1X44-D50, 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, 12.3 prior to 12.3R9, 12.3X48 prior to 12.3X48-D15, 13.2 prior to 13.2R7, 13.2X51 prior to 13.2X51-D35, 13.3 prior to 13.3R6, 14.1 prior to 14.1R5, 14.1X50 prior to 14.1X50-D105, 14.1X51 prior to 14.1X51-D70, 14.1X53 prior to 14.1X53-D25, 14.1X55 prior to 14.1X55-D20, 14.2 prior to 14.2R1, 15.1 prior to 15.1F2 or 15.1R1, and 15.1X49 prior to 15.1X49-D10 does not require a password for the root user when pam.conf is "corrupted," which allows local users to gain root privileges by modifying the file.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos

juniper junos 12.1x46

juniper junos 12.1x47

juniper junos 12.3

juniper junos 13.2

juniper junos 13.2x51

juniper junos 13.3

juniper junos 14.1

juniper junos 14.2

juniper junos 15.1

juniper junos 14.1x50

juniper junos 14.1x51

juniper junos 14.1x53

juniper junos 14.1x55

juniper junos 12.3x48

juniper junos 15.1x49