First published: Fri Aug 16 2013(Updated: )
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly restrict access to the list of user accounts and their MD5 password hashes, which makes it easier for remote authenticated users to obtain sensitive information via a dictionary attack, aka PR 879462.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | =11.1 | |
Juniper Networks Junos Space | =11.2 | |
Juniper Networks Junos Space | =11.3 | |
Juniper Networks Junos Space | =11.4 | |
Juniper Networks Junos Space | =12.1 | |
Juniper Networks Junos Space | =12.2 | |
Juniper Networks Junos Space | =12.3 | |
Juniper Junos Space Virtual Appliance | ||
Juniper Junos Space JA1500 Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5097 has a moderate severity rating due to improper access restrictions that can lead to exposure of sensitive user information.
To fix CVE-2013-5097, update your Junos Space software to version 13.1R1.6 or later, which addresses this vulnerability.
CVE-2013-5097 affects users of Juniper Junos Space, specifically versions 11.1 through 12.3 and the JA1500 appliance.
The potential risks of CVE-2013-5097 include unauthorized access to user accounts and password hashes, which could lead to a successful dictionary attack.
There are no known workarounds for CVE-2013-5097, so upgrading to a secure version is necessary to mitigate the threat.