First published: Tue May 20 2014(Updated: )
Unspecified vulnerability in Juniper Junos Space before 13.3R1.8, when the firewall in disabled, allows remote attackers to execute arbitrary commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | <=13.1 | |
Juniper Networks Junos Space | =1.0 | |
Juniper Networks Junos Space | =1.1 | |
Juniper Networks Junos Space | =1.2 | |
Juniper Networks Junos Space | =1.3 | |
Juniper Networks Junos Space | =1.4 | |
Juniper Networks Junos Space | =2.0 | |
Juniper Networks Junos Space | =11.1 | |
Juniper Networks Junos Space | =11.2 | |
Juniper Networks Junos Space | =11.3 | |
Juniper Networks Junos Space | =11.4 | |
Juniper Networks Junos Space | =12.1 | |
Juniper Networks Junos Space | =12.2 | |
Juniper Networks Junos Space | =12.3 | |
Juniper Junos Space JA1500 Appliance | ||
Juniper Junos Space JA2500 Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3412 is considered a high severity vulnerability due to its ability to allow remote attackers to execute arbitrary commands.
CVE-2014-3412 affects multiple versions of Juniper's Junos Space, specifically versions before 13.3R1.8 and certain specific versions like 1.0 through 1.4.
To mitigate CVE-2014-3412, upgrade to a version of Junos Space that is 13.3R1.8 or later.
Exploitation of CVE-2014-3412 can lead to remote command execution by attackers when the firewall is disabled.
CVE-2014-3412 was disclosed in June 2014 as part of a security advisory from Juniper Networks.