Knowledge Search


×
 

Junos OS: vSRX, SRX1500, SRX4K, ACX5K, EX4600, QFX5100, QFX5110, QFX5200, QFX10K and NFX Series: console management port device authentication credentials are logged in clear text

  [JSA10969] Show Article Properties


Product Affected:
This issue affects Junos OS 14.1X53, 15.1, 15.1X49, 15.1X53, 16.1R7, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4. Affected platforms: ACX5000, EX4600, NFX, QFX10K, QFX5100, QFX5110, QFX5110 QFX5200, QFX5200, SRX1500, SRX4000, vSRX.
Problem:

On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during device authentication are written to a log file in clear text. This issue does not affect users that are logging-in using telnet, SSH or J-web to the management IP.

This issue affects ACX, NFX, SRX, EX and QFX platforms with the Linux Host OS architecture, it does not affect other SRX and EX platforms that do not use the Linux Host OS architecture.

This issue affects Juniper Networks Junos OS:

15.1X49 versions prior to 15.1X49-D110 on vSRX, SRX1500, SRX4000 Series;

15.1X53 versions prior to 15.1X53-D234 on QFX5110, QFX5200 Series;

15.1X53 versions prior to 15.1X53-D68 on QFX10K Series;

17.1 versions prior to 17.1R2-S8, 17.1R3, on QFX5110, QFX5200, QFX10K Series;

17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3 on QFX5110, QFX5200, QFX10K Series;

17.3 versions prior to 17.3R2 on vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series;

14.1X53 versions prior to 14.1X53-D47 on ACX5000, EX4600, QFX5100 Series;

15.1 versions prior to 15.1R7 on ACX5000, EX4600, QFX5100 Series;

16.1R7 versions prior to 16.1R7 on ACX5000, EX4600, QFX5100 Series;

17.1 versions prior to 17.1R2-S10, 17.1R3 on ACX5000, EX4600, QFX5100 Series;

17.2 versions prior to 17.2R3 on ACX5000, EX4600, QFX5100 Series;

17.3 versions prior to 17.3R3 on ACX5000, EX4600, QFX5100 Series;

17.4 versions prior to 17.4R2 on ACX5000, EX4600, QFX5100 Series;

18.1 versions prior to 18.1R2 on ACX5000, EX4600, QFX5100 Series;

15.1X53 versions prior to 15.1X53-D496 on NFX Series,

17.2 versions prior to 17.2R3-S1 on NFX Series;

17.3 versions prior to 17.3R3-S4 on NFX Series;

17.4 versions prior to 17.4R2-S4, 17.4R3 on NFX Series,

18.1 versions prior to 18.1R3-S4 on NFX Series;

18.2 versions prior to 18.2R2-S3, 18.2R3 on NFX Series;

18.3 versions prior to 18.3R1-S3, 18.3R2 on NFX Series;

18.4 versions prior to 18.4R1-S1, 18.4R2 on NFX Series.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue was found during internal product security testing or research.

This issue has been assigned CVE-2019-0069.

Solution:

For vSRX, SRX1500, SRX4000 Series, QFX5110, QFX5200, QFX10K Series:

The following software releases have been updated to resolve this specific issue: 15.1X49-D110, 15.1X53-D234, 15.1X53-D68, 17.1R2-S8, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2, 17.4R1, and all subsequent releases.

For ACX5000, EX4600 and QFX5100 Series:

The following software releases have been updated to resolve this specific issue: 14.1X53-D47, 15.1R7, 16.1R7, 17.1R3, 17.2R3, 17.3R3, 17.4R2, 18.1R2, 18.2R1, and all subsequent releases.

For NFX Series:

The following software releases have been updated to resolve this specific issue: 15.1X53-D496, 17.2R3-S1, 17.3R3-S4, 17.4R3, 18.1R3-S4, 18.2R3, 18.3R2, 18.4R1-S1, 18.4R2, 19.1R1 and all subsequent releases.

In addition to the upgrade, it is recommended to change the password and as the credentials might have been logged prior to the upgrade to the fixed release, in the SRX, QFX, ACX and EX Series it is recommended to clear the log files and archives.

This issue is being tracked as PR 1290331, 1350426 and 1408195 which are visible on the Customer Support website.

Note: Juniper SIRT's policy is not to evaluate releases which are beyond End of Engineering (EOE) or End of Life (EOL).

Workaround:
There are no available workarounds for this issue.

 

Implementation:
Software Releases, patches and updates are available at https://www.juniper.net/support/downloads/.
Modification History:
2019-10-09: Initial Publication.
Related Links:
CVSS Score:
6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
Severity Level:
Medium
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."