First published: Wed May 08 2013(Updated: )
Juniper Junos Space before 12.3P2.8, as used on the JA1500 appliance and in other contexts, includes a cleartext password in a configuration tab, which makes it easier for physically proximate attackers to obtain the password by reading the workstation screen.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=12.3 | |
Juniper Networks Junos Space | =1.0 | |
Juniper Networks Junos Space | =1.1 | |
Juniper Networks Junos Space | =1.2 | |
Juniper Networks Junos Space | =1.3 | |
Juniper Networks Junos Space | =1.4 | |
Juniper Networks Junos Space | =2.0 | |
Juniper Networks Junos Space | =11.1 | |
Juniper Networks Junos Space | =11.2 | |
Juniper Networks Junos Space | =11.3 | |
Juniper Networks Junos Space | =11.4 | |
Juniper Networks Junos Space | =12.1 | |
Juniper Networks Junos Space | =12.2 | |
Juniper Junos Space Virtual Appliance | ||
Juniper Junos Space JA1500 Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3497 is considered a high severity vulnerability due to the exposure of cleartext passwords.
To mitigate CVE-2013-3497, upgrade Junos Space to version 12.3P2.8 or later to eliminate cleartext password exposure.
CVE-2013-3497 affects Juniper Networks Junos Space versions 1.0 through 12.3 and the Junos Space JA1500 appliance.
CVE-2013-3497 facilitates physical access attacks where an attacker can read cleartext passwords from the screen.
CVE-2013-3497 is a local vulnerability, requiring physical access to the workstation display to exploit.