Juniper Junos OS prior to 12.1X44-D50, 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, 12.3 prior to 12.3R9, 12.3X48 prior to 12.3X48-D15, 13.2 prior to 13.2R7, 13.2X51 prior to 13.2X51-D35, 13.3 prior to 13.3R6, 14.1 prior to 14.1R5, 14.1X50 prior to 14.1X50-D105, 14.1X51 prior to 14.1X51-D70, 14.1X53 prior to 14.1X53-D25, 14.1X55 prior to 14.1X55-D20, 14.2 prior to 14.2R1, 15.1 prior to 15.1F2 or 15.1R1, and 15.1X49 prior to 15.1X49-D10 does not require a password for the root user when pam.conf is "corrupted," which allows local users to gain root privileges by modifying the file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos |
||
juniper junos 12.1x46 |
||
juniper junos 12.1x47 |
||
juniper junos 12.3 |
||
juniper junos 13.2 |
||
juniper junos 13.2x51 |
||
juniper junos 13.3 |
||
juniper junos 14.1 |
||
juniper junos 14.2 |
||
juniper junos 15.1 |
||
juniper junos 14.1x50 |
||
juniper junos 14.1x51 |
||
juniper junos 14.1x53 |
||
juniper junos 14.1x55 |
||
juniper junos 12.3x48 |
||
juniper junos 15.1x49 |