Vulnerability Name:

CVE-2019-0039 (CCN-159357)

Assigned:2018-10-11
Published:2019-04-10
Updated:2021-10-25
Summary:If REST API is enabled, the Junos OS login credentials are vulnerable to brute force attacks. The high default connection limit of the REST API may allow an attacker to brute-force passwords using advanced scripting techniques. Additionally, administrators who do not enforce a strong password policy can increase the likelihood of success from brute force attacks. Affected releases are Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S3; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D495, 15.1X53-D591, 15.1X53-D69; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S3; 16.1X65 versions prior to 16.1X65-D49; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S10, 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S2; 17.4 versions prior to 17.4R1-S6, 17.4R2-S2; 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.2 versions prior to 18.2R1-S5; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R1-S1.
CVSS v3 Severity:8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-307
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2019-0039

Source: BID
Type: Third Party Advisory, VDB Entry
107899

Source: XF
Type: UNKNOWN
juniper-cve20190039-info-disc(159357)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10928
Junos OS: Login credentials are vulnerable to brute force attacks through the REST API (CVE-2019-0039)

Source: CONFIRM
Type: Mitigation, Vendor Advisory
https://kb.juniper.net/JSA10928

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 14.1x53 and < 14.1x53-d49)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 16.1 and < 16.1r3-s10)
  • OR cpe:/o:juniper:junos:16.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.2 and < 17.2r1-s8)
  • OR cpe:/o:juniper:junos:17.2r3-s1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.2x75 and < 18.2x75-d30)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.3 and < 18.3r1-s1)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 15.1x49 and < 15.1x49-d160)
  • OR cpe:/o:juniper:junos:15.1x53-d69:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 16.1x65 and < 16.1x65-d49)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 16.2 and < 16.2r2-s7)
  • OR cpe:/o:juniper:junos:17.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.1 and < 18.1r2-s4)
  • OR cpe:/o:juniper:junos:15.1r7-s3:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 15.1 and < 15.1f6-s12)
  • OR cpe:/o:juniper:junos:16.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:16.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.3 and < 17.3r3-s2)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.4 and < 17.4r1-s6)
  • OR cpe:/o:juniper:junos:15.1x53-d495:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53-d591:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 15.1x53 and < 15.1x53-d236)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.1 and < 17.1r2-s10)
  • OR cpe:/o:juniper:junos:17.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.2 and < 18.2r1-s5)

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:15.1x49:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:16.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:16.1x65:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:16.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x49:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:*:*:*:*:*:*:*
  • OR cpe:/a:juniper:junos:18.1:-:*:*:*:*:*:*
  • OR cpe:/a:juniper:junos:18.2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.4:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos *
    juniper junos *
    juniper junos 16.1
    juniper junos *
    juniper junos 17.2r3-s1
    juniper junos *
    juniper junos *
    juniper junos *
    juniper junos 15.1x53-d69
    juniper junos *
    juniper junos *
    juniper junos 17.4
    juniper junos *
    juniper junos 15.1r7-s3
    juniper junos *
    juniper junos 16.1
    juniper junos 16.1
    juniper junos *
    juniper junos *
    juniper junos 15.1x53-d495
    juniper junos 15.1x53-d591
    juniper junos *
    juniper junos *
    juniper junos 17.1
    juniper junos 18.1
    juniper junos *
    juniper junos 15.1x49
    juniper junos 14.1x53 -
    juniper junos 15.1
    juniper junos 16.1 -
    juniper junos 16.1x65
    juniper junos 16.2 -
    juniper junos 17.1 -
    juniper junos 17.2 -
    juniper junos 17.3 -
    juniper junos 15.1x49
    juniper junos 15.1x53
    juniper junos 18.1 -
    juniper junos 18.2
    juniper junos 17.4 -