![]() Juniper Networks Junos OS Evolved * All versions prior to 21.4R3-S4-EVO * 22.1 versions prior to 22.1R3-S2-EVO * 22.2 versions prior to 22.2R3-EVO * 22.3 versions prior to 22.3R3-EVO * 22.4 versions prior to 22.4R2-EVO. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluatedĪn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device's control plane. This is only exposed when ssh debug is enabled. The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |