7.2
CVSSv2

CVE-2018-0008

Published: 10/01/2018 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.2 | Impact Score: 5.9 | Exploitability Score: 0.3
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An unauthenticated root login may allow upon reboot when a commit script is used. A commit script allows a device administrator to execute certain instructions during commit, which is configured under the [system scripts commit] stanza. Certain commit scripts that work without a problem during normal commit may cause unexpected behavior upon reboot which can leave the system in a state where root CLI login is allowed without a password due to the system reverting to a "safe mode" authentication state. Lastly, only logging in physically to the console port as root, with no password, will work. Affected releases are Juniper Networks Junos OS: 12.1X46 versions before 12.1X46-D71 on SRX; 12.3X48 versions before 12.3X48-D55 on SRX; 14.1 versions before 14.1R9; 14.1X53 versions before 14.1X53-D40 on QFX, EX; 14.2 versions before 14.2R7-S9, 14.2R8; 15.1 versions before 15.1F5-S7, 15.1F6-S8, 15.1R5-S6, 15.1R6; 15.1X49 versions before 15.1X49-D110 on SRX; 15.1X53 versions before 15.1X53-D232 on QFX5200/5110; 15.1X53 versions before 15.1X53-D49, 15.1X53-D470 on NFX; 15.1X53 versions before 15.1X53-D65 on QFX10K; 16.1 versions before 16.1R2. No other Juniper Networks products or platforms are affected by this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 12.1x46

juniper junos 12.3x48

juniper junos 15.1x49

juniper junos 14.1

juniper junos 14.1x53

juniper junos 14.2

juniper junos 15.1

juniper junos 15.1x53

juniper junos 16.1