First published: Wed Apr 08 2020(Updated: )
The factory configuration for vMX installations, as shipped, includes default credentials for the root account. Without proper modification of these default credentials by the administrator, an attacker could exploit these credentials and access the vMX instance without authorization. This issue affects Juniper Networks Junos OS: 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on vMX; 17.2 versions prior to 17.2R3-S3 on vMX; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on vMX; 17.4 versions prior to 17.4R2-S9, 17.4R3 on vMX; 18.1 versions prior to 18.1R3-S9 on vMX; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on vMX; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D60 on vMX; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1 on vMX; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on vMX; 19.1 versions prior to 19.1R1-S4, 19.1R2, 19.1R3 on vMX; 19.2 versions prior to 19.2R1-S3, 19.2R2 on vMX; 19.3 versions prior to 19.3R1-S1, 19.3R2 on vMX.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =17.1 | |
Junos OS Evolved | =17.1-r1 | |
Junos OS Evolved | =17.1-r2 | |
Junos OS Evolved | =17.1-r2-s1 | |
Junos OS Evolved | =17.1-r2-s10 | |
Junos OS Evolved | =17.1-r2-s2 | |
Junos OS Evolved | =17.1-r2-s3 | |
Junos OS Evolved | =17.1-r2-s4 | |
Junos OS Evolved | =17.1-r2-s5 | |
Junos OS Evolved | =17.1-r2-s6 | |
Junos OS Evolved | =17.1-r2-s7 | |
Junos OS Evolved | =17.1-r2-s8 | |
Junos OS Evolved | =17.1-r2-s9 | |
Junos OS Evolved | =17.1-r3 | |
Junos OS Evolved | =17.1-r3-s1 | |
Junos OS Evolved | =17.2 | |
Junos OS Evolved | =17.2-r1 | |
Junos OS Evolved | =17.2-r1-s1 | |
Junos OS Evolved | =17.2-r1-s2 | |
Junos OS Evolved | =17.2-r1-s3 | |
Junos OS Evolved | =17.2-r1-s4 | |
Junos OS Evolved | =17.2-r1-s5 | |
Junos OS Evolved | =17.2-r1-s7 | |
Junos OS Evolved | =17.2-r1-s8 | |
Junos OS Evolved | =17.2-r2 | |
Junos OS Evolved | =17.2-r2-s6 | |
Junos OS Evolved | =17.2-r2-s7 | |
Junos OS Evolved | =17.2-r3-s1 | |
Junos OS Evolved | =17.2-r3-s2 | |
Junos OS Evolved | =17.3 | |
Junos OS Evolved | =17.3-r1-s1 | |
Junos OS Evolved | =17.3-r2 | |
Junos OS Evolved | =17.3-r2-s1 | |
Junos OS Evolved | =17.3-r2-s2 | |
Junos OS Evolved | =17.3-r2-s3 | |
Junos OS Evolved | =17.3-r2-s4 | |
Junos OS Evolved | =17.3-r3 | |
Junos OS Evolved | =17.3-r3-s1 | |
Junos OS Evolved | =17.3-r3-s2 | |
Junos OS Evolved | =17.3-r3-s3 | |
Junos OS Evolved | =17.3-r3-s4 | |
Junos OS Evolved | =17.3-r3-s5 | |
Junos OS Evolved | =17.3-r3-s6 | |
Junos OS Evolved | =17.4 | |
Junos OS Evolved | =17.4-r1 | |
Junos OS Evolved | =17.4-r1-s1 | |
Junos OS Evolved | =17.4-r1-s2 | |
Junos OS Evolved | =17.4-r1-s4 | |
Junos OS Evolved | =17.4-r1-s5 | |
Junos OS Evolved | =17.4-r1-s6 | |
Junos OS Evolved | =17.4-r1-s7 | |
Junos OS Evolved | =17.4-r2 | |
Junos OS Evolved | =17.4-r2-s1 | |
Junos OS Evolved | =17.4-r2-s2 | |
Junos OS Evolved | =17.4-r2-s3 | |
Junos OS Evolved | =17.4-r2-s4 | |
Junos OS Evolved | =17.4-r2-s5 | |
Junos OS Evolved | =17.4-r2-s6 | |
Junos OS Evolved | =17.4-r2-s7 | |
Junos OS Evolved | =17.4-r2-s8 | |
Junos OS Evolved | =18.1 | |
Junos OS Evolved | =18.1-r2 | |
Junos OS Evolved | =18.1-r2-s1 | |
Junos OS Evolved | =18.1-r2-s2 | |
Junos OS Evolved | =18.1-r2-s4 | |
Junos OS Evolved | =18.1-r3 | |
Junos OS Evolved | =18.1-r3-s1 | |
Junos OS Evolved | =18.1-r3-s2 | |
Junos OS Evolved | =18.1-r3-s3 | |
Junos OS Evolved | =18.1-r3-s4 | |
Junos OS Evolved | =18.1-r3-s6 | |
Junos OS Evolved | =18.1-r3-s7 | |
Junos OS Evolved | =18.1-r3-s8 | |
Junos OS Evolved | =18.2 | |
Junos OS Evolved | =18.2-r1-s3 | |
Junos OS Evolved | =18.2-r1-s5 | |
Junos OS Evolved | =18.2-r2-s1 | |
Junos OS Evolved | =18.2-r2-s2 | |
Junos OS Evolved | =18.2-r2-s3 | |
Junos OS Evolved | =18.2-r2-s4 | |
Junos OS Evolved | =18.2-r2-s5 | |
Junos OS Evolved | =18.2-r2-s6 | |
Junos OS Evolved | =18.2-r3 | |
Junos OS Evolved | =18.2-r3-s1 | |
Junos OS Evolved | =18.2-r3-s2 | |
Junos OS Evolved | =18.2x75 | |
Junos OS Evolved | =18.2x75-d20 | |
Junos OS Evolved | =18.2x75-d30 | |
Junos OS Evolved | =18.2x75-d40 | |
Junos OS Evolved | =18.2x75-d10 | |
Junos OS Evolved | =18.3 | |
Junos OS Evolved | =18.3-r1 | |
Junos OS Evolved | =18.3-r1-s1 | |
Junos OS Evolved | =18.3-r1-s2 | |
Junos OS Evolved | =18.3-r1-s3 | |
Junos OS Evolved | =18.3-r1-s4 | |
Junos OS Evolved | =18.3-r1-s5 | |
Junos OS Evolved | =18.3-r1-s6 | |
Junos OS Evolved | =18.3-r2 | |
Junos OS Evolved | =18.3-r2-s1 | |
Junos OS Evolved | =18.3-r2-s2 | |
Junos OS Evolved | =18.4 | |
Junos OS Evolved | =18.4-r1 | |
Junos OS Evolved | =18.4-r1-s1 | |
Junos OS Evolved | =18.4-r1-s2 | |
Junos OS Evolved | =18.4-r1-s3 | |
Junos OS Evolved | =18.4-r1-s4 | |
Junos OS Evolved | =18.4-r1-s5 | |
Junos OS Evolved | =18.4-r2 | |
Junos OS Evolved | =18.4-r2-s1 | |
Junos OS Evolved | =18.4-r2-s2 | |
Junos OS Evolved | =19.1 | |
Junos OS Evolved | =19.1-r1 | |
Junos OS Evolved | =19.1-r1-s1 | |
Junos OS Evolved | =19.1-r1-s2 | |
Junos OS Evolved | =19.1-r1-s3 | |
Junos OS Evolved | =19.2 | |
Junos OS Evolved | =19.2-r1 | |
Junos OS Evolved | =19.2-r1-s1 | |
Junos OS Evolved | =19.2-r1-s2 | |
Junos OS Evolved | =19.3 | |
Junos OS Evolved | =19.3-r1 | |
Juniper vMX |
The following software releases have been updated to resolve this specific issue: 17.1R2-S11, 17.1R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R3-S7, 17.4R2-S9, 17.4R3, 18.1R3-S9, 18.2R2-S7, 18.2R3-S3, 18.2X75-D420, 18.2X75-D60, 18.3R1-S7, 18.3R2-S3, 18.3R3-S1, 18.4R1-S5, 18.4R2-S3, 18.4R3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1-S3, 19.2R2, 19.3R1-S1, 19.3R2, 19.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1615 has a high severity due to the inclusion of default credentials for the root account in vMX installations.
To fix CVE-2020-1615, it is essential to change the default root account credentials to secure passwords immediately after installation.
CVE-2020-1615 affects multiple versions of Juniper JUNOS, including 17.1, 17.2, 17.3, 17.4, and several sub-releases.
Failing to address CVE-2020-1615 can allow unauthorized access to the vMX instance, potentially leading to data breaches or system compromises.
The primary mitigation for CVE-2020-1615 is to ensure that default root passwords are updated to unique and strong passwords.