First published: Wed Oct 10 2018(Updated: )
An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up. Affected releases are Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D30 on vSRX.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =15.1x49 | |
Juniper JUNOS | =15.1x49-d10 | |
Juniper JUNOS | =15.1x49-d20 | |
Juniper vSRX |
The following software releases have been updated to resolve this specific issue: Junos OS 15.1X49-D30, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0053 is an authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series.
CVE-2018-0053 allows an attacker to gain full control of the system without authentication when the system is initially booted up.
The severity of CVE-2018-0053 is high with a CVSS score of 6.8.
The affected releases are Juniper Networks Junos OS 15.1X49 versions pr…
To fix CVE-2018-0053, it is recommended to upgrade to a non-vulnerable version of Juniper Networks Junos OS.