First published: Fri Aug 16 2013(Updated: )
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privilege, aka PR 863804.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | =11.1 | |
Juniper Networks Junos Space | =11.2 | |
Juniper Networks Junos Space | =11.3 | |
Juniper Networks Junos Space | =11.4 | |
Juniper Networks Junos Space | =12.1 | |
Juniper Networks Junos Space | =12.2 | |
Juniper Networks Junos Space | =12.3 | |
Juniper Junos Space Virtual Appliance | ||
Juniper Junos Space JA1500 Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5096 has a medium severity rating due to improper implementation of role-based access control.
To resolve CVE-2013-5096, upgrade to Junos Space version 13.1R1.6 or later.
CVE-2013-5096 affects users of Juniper Networks Junos Space versions 11.1 to 12.3 and the Junos Space JA1500 appliance.
CVE-2013-5096 is an access control vulnerability allowing unauthorized configuration changes.
Yes, remote authenticated users can exploit CVE-2013-5096 to modify configurations despite having read-only privileges.