| [Japanese] | 
| JVNDB-2020-000002 | 
| Junos OS vulnerable to directory traversal | 
|
| 
 
Junos OS contains a directory traversal vulnerability (CWE-22).
 Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 5.4 (Medium) [IPA Score]
 
    Attack Vector: NetworkAttack Complexity: LowPrivileges Required: LowUser Interaction: NoneScope: UnchangedConfidentiality Impact: LowIntegrity Impact: LowAvailability Impact: None 
  CVSS V2 Severity:Base Metrics 5.5 (Medium) [IPA Score]
 
    Access Vector: NetworkAccess Complexity: LowAuthentication: Single InstanceConfidentiality Impact: PartialIntegrity Impact: PartialAvailability Impact: None 
  
 | 
|
| 
 
	
 | 
| 
 
	Juniper Networks, Inc.
	
		Junos OS 12.3 versions prior to 12.3R12-S13Junos OS 12.3X48 versions prior to 12.3X48-D85 on SRX SeriesJunos OS 14.1X53 versions prior to 14.1X53-D51Junos OS 15.1F6 versions prior to 15.1F6-S13Junos OS 15.1 versions prior to 15.1R7-S5Junos OS 15.1X49 versions prior to 15.1X49-D180 on SRX SeriesJunos OS 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 SeriesJunos OS 16.1 versions prior to 16.1R4-S13, 16.1R7-S5Junos OS 16.2 versions prior to 16.2R2-S10Junos OS 17.1 versions prior to 17.1R3-S1Junos OS 17.2 versions prior to 17.2R1-S9, 17.2R3-S2Junos OS 17.3 versions prior to 17.3R2-S5, 17.3R3-S5Junos OS 17.4 versions prior to 17.4R2-S9, 17.4R3Junos OS 18.1 versions prior to 18.1R3-S8Junos OS 18.2 versions prior to 18.2R3Junos OS 18.3 versions prior to 18.3R2-S3, 18.3R3Junos OS 18.4 versions prior to 18.4R2Junos OS 19.1 versions prior to 19.1R1-S4, 19.1R | 
| 
 
	
 | 
|
| 
 
Files on the server may be viewed or deleted by an authenticated J-web user.
 According to the developer, this issue does not affect system files that can be accessed only by root user.
 | 
|
| 
 
[Update the Software]Update the software to the latest version according to the information provided by the developer.
 
 [Apply a Workaround]
 Applying a workaround listed below may mitigate the impacts of the vulnerability.
 * Limit access to the J-Web interface to only trusted users
 | 
|
| 
 
	Juniper Networks, Inc.
	
 | 
|
| 
 
	Path Traversal(CWE-22) [IPA Evaluation] | 
|
| 
 
	CVE-2020-1606  | 
|
| 
 
	JVN : JVN#07375820 National Vulnerability Database (NVD) : CVE-2020-1606  | 
|
| 
 
	[2020/01/10]Web page was published
 
 |