juniper junos-evolved CVE-2020-1666 vulnerability in Juniper Networks Products
Published on October 16, 2020

Junos OS Evolved: 'console log-out-on-disconnect' fails to terminate session on console cable disconnection
The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. This issue affects all Juniper Networks Junos OS Evolved versions after 18.4R1-EVO, prior to 20.2R1-EVO.

NVD

Vulnerability Analysis

CVE-2020-1666 is exploitable with physical access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
PHYSICAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2020-1666 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2020-1666

stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Junos Evolved or Juniper Networks Junos Os Evolved. Just hit a watch button to start following.

 
 

Affected Versions

Juniper Networks Junos OS Evolved:

Exploit Probability

EPSS
0.04%
Percentile
12.49%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.