| Title | Juniper Junos における認証を回避される脆弱性 |
|---|---|
| Summary | Juniper Junos は、RADIUS アカウンティングサーバが [system accounting destination radius] に設定されている場合、/var/etc/pam_radius.conf にエントリーを作成するため、認証を回避される脆弱性が存在します。 |
| Possible impacts | 第三者により、認証を回避される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 8, 2014, midnight |
| Registration Date | Oct. 21, 2014, 4:09 p.m. |
| Last Update | Oct. 21, 2014, 4:09 p.m. |
| CVSS2.0 : 危険 | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| ジュニパーネットワークス |
| Junos OS 11.4R12 未満の 11.4 |
| Junos OS 12.1R10 未満の 12.1 |
| Junos OS 12.1X44-D35 未満の 12.1X44 |
| Junos OS 12.1X45-D25 未満の 12.1X45 |
| Junos OS 12.1X46-D20 未満の 12.1X46 |
| Junos OS 12.1X47-D10 未満の 12.1X47 |
| Junos OS 12.2R8 未満の 12.2 |
| Junos OS 12.2X50-D70 未満の 12.2X50 |
| Junos OS 12.3R6 未満の 12.3 |
| Junos OS 13.1R4-S3 未満の 13.1 |
| Junos OS 13.1X49-D55 未満の 13.1X49 |
| Junos OS 13.1X50-D30 未満の 13.1X50 |
| Junos OS 13.2R4 未満の 13.2 |
| Junos OS 13.2X50-D20 未満の 13.2X50 |
| Junos OS 13.2X51-D26 未満の 13.2X51 |
| Junos OS 13.2X51-D30 未満の 13.2X51 |
| Junos OS 13.2X52-D15 未満の 13.2X52 |
| Junos OS 13.3R2 未満の 13.3 |
| Junos OS 14.1R1 未満の 14.1 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2014年10月21日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Juniper Junos 11.4 before R12, 12.1 before R10, 12.1X44 before D35, 12.1X45 before D25, 12.1X46 before D20, 12.1X47 before D10, 12.2 before R8, 12.2X50 before D70, 12.3 before R6, 13.1 before R4-S3, 13.1X49 before D55, 13.1X50 before D30, 13.2 before R4, 13.2X50 before D20, 13.2X51 before D26 and D30, 13.2X52 before D15, 13.3 before R2, and 14.1 before R1, when a RADIUS accounting server is configured as [system accounting destination radius], creates an entry in /var/etc/pam_radius.conf, which might allow remote attackers to bypass authentication via unspecified vectors. |
|---|---|
| Publication Date | Oct. 14, 2014, 11:55 p.m. |
| Registration Date | Jan. 26, 2021, 3:16 p.m. |
| Last Update | Nov. 21, 2024, 11:14 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:13.2x50:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.2x52:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.2x50:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.1x50:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.1x49:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.1:r4-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:13.2x51:*:*:*:*:*:*:* | |||||