Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-0073 : Security Advisory and Response

Learn about CVE-2019-0073 impacting Junos OS, allowing unauthorized access to PKI keys due to insecure file permissions. Find mitigation steps and recommended updates here.

Junos OS: PKI key pairs are exported with insecure file permissions

Understanding CVE-2019-0073

This CVE involves the insecure file permissions of PKI keys exported in Junos OS, potentially allowing unauthorized access to sensitive information.

What is CVE-2019-0073?

The vulnerability in Junos OS allows users with shell access to read PKI keys exported using a specific command due to insecure file permissions.

The Impact of CVE-2019-0073

        CVSS Base Score: 6.6 (Medium Severity)
        Attack Vector: Local
        Confidentiality Impact: High
        Integrity Impact: High
        Privileges Required: Low
        User Interaction: Required
        Scope: Unchanged
        Exploitation: No known malicious exploitation reported by Juniper SIRT.

Technical Details of CVE-2019-0073

The technical details of this CVE include:

Vulnerability Description

The PKI keys exported in Junos OS using a specific command may have insecure file permissions, potentially compromising their confidentiality and integrity.

Affected Systems and Versions

The following Juniper Networks Junos OS versions are impacted:

        15.1X49 versions before 15.1X49-D180
        17.3 versions before 17.3R3-S7
        17.4 versions before 17.4R2-S8 and 17.4R3
        18.1 versions before 18.1R3-S8
        18.2 versions before 18.2R3
        18.3 versions before 18.3R2
        18.4 versions before 18.4R2

Exploitation Mechanism

The vulnerability requires low privileges and user interaction, with the attack complexity being low and the attack vector being local.

Mitigation and Prevention

To address CVE-2019-0073, consider the following steps:

Immediate Steps to Take

        Avoid using directories readable by other users when exporting PKI keys.
        Limit access to Junos OS devices to trusted administrators.

Long-Term Security Practices

        Regularly review and update file permissions on sensitive data.
        Implement access controls and user permissions to restrict unauthorized access.

Patching and Updates

Ensure the Junos OS is updated to the following versions or later to resolve the issue:

        15.1X49-D180
        17.3R3-S7*
        17.4R2-S8, 17.4R3*
        18.1R3-S8*
        18.2R3
        18.3R2
        18.4R2
        19.1R1 and subsequent releases

*Pending release.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now