First published: Wed Jan 10 2018(Updated: )
A vulnerability in the Juniper Networks Junos Space Security Director allows a user who does not have SSH access to a device to reuse the URL that was created for another user to perform SSH access. Affected releases are all versions of Junos Space Security Director prior to 17.2R1.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos Space | =13.3-r1 | |
Juniper Networks Junos Space | =13.3-r2 | |
Juniper Networks Junos Space | =14.1-r1 | |
Juniper Networks Junos Space | =14.1-r2 | |
Juniper Networks Junos Space | =14.1-r3 | |
Juniper Networks Junos Space | =15.1-r1 | |
Juniper Networks Junos Space | =15.1-r2 | |
Juniper Networks Junos Space | =15.1-r3 | |
Juniper Networks Junos Space | =15.1-r4 | |
Juniper Networks Junos Space | =15.2-r1 | |
Juniper Networks Junos Space | =15.2-r2 | |
Juniper Networks Junos Space | =16.1-r1 | |
Juniper Networks Junos Space | =16.1-r2 | |
Juniper Networks Junos Space | =16.1-r3 | |
Juniper Networks Junos Space | =17.1-r1 | |
Juniper Networks Junos Space | =17.2-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0010 is considered a high severity vulnerability due to unauthorized SSH access risks.
To fix CVE-2018-0010, upgrade to Junos Space Security Director version 17.2R1 or later.
CVE-2018-0010 affects all versions of Junos Space Security Director prior to version 17.2R1.
Yes, CVE-2018-0010 can potentially be exploited remotely if a user reuses another user's SSH URL.
The impact of CVE-2018-0010 on network security includes unauthorized access to devices, which can lead to data breaches.