CVE Vulnerabilities

CVE-2020-1669

Plaintext Storage of a Password

Published: Oct 16, 2020 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file /etc/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2.

Weakness

The product stores a password in plaintext within resources such as memory or files.

Affected Software

NameVendorStart VersionEnd Version
JunosJuniper19.4-r1 (including)19.4-r1 (including)
JunosJuniper19.4-r1-s1 (including)19.4-r1-s1 (including)
JunosJuniper19.4-r1-s2 (including)19.4-r1-s2 (including)
JunosJuniper19.4-r2 (including)19.4-r2 (including)
JunosJuniper20.1-r1 (including)20.1-r1 (including)
JunosJuniper20.1-r1-s1 (including)20.1-r1-s1 (including)
JunosJuniper20.1-r1-s2 (including)20.1-r1-s2 (including)
JunosJuniper20.1-r1-s3 (including)20.1-r1-s3 (including)

Potential Mitigations

References