7.2
CWE
287 288
Advisory Published
Updated

CVE-2020-1637: Junos OS: SRX Series: Unified Access Control (UAC) bypass vulnerability

First published: Wed Apr 08 2020(Updated: )

A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy. This issue might occur when the IP address range configured in the Infranet Controller (IC) is configured as an IP address range instead of an IP address/netmask. See the Workaround section for more detail. The Junos OS Enforcer CLI settings are disabled by default. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D100; 15.1X49 versions prior to 15.1X49-D210; 17.3 versions prior to 17.3R2-S5, 17.3R3-S8; 17.4 versions prior to 17.4R2-S9, 17.4R3-S1; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3; 18.3 versions prior to 18.3R1-S7, 18.3R3-S2; 18.4 versions prior to 18.4R1-S6, 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S3, 19.2R2; 19.3 versions prior to 19.3R2-S1, 19.3R3; 19.4 versions prior to 19.4R1-S1, 19.4R2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=12.3x48
Junos OS Evolved=12.3x48-d10
Junos OS Evolved=12.3x48-d15
Junos OS Evolved=12.3x48-d20
Junos OS Evolved=12.3x48-d25
Junos OS Evolved=12.3x48-d30
Junos OS Evolved=12.3x48-d35
Junos OS Evolved=12.3x48-d40
Junos OS Evolved=12.3x48-d45
Junos OS Evolved=12.3x48-d50
Junos OS Evolved=12.3x48-d51
Junos OS Evolved=12.3x48-d55
Junos OS Evolved=12.3x48-d60
Junos OS Evolved=12.3x48-d65
Junos OS Evolved=12.3x48-d70
Junos OS Evolved=12.3x48-d75
Junos OS Evolved=12.3x48-d80
Junos OS Evolved=15.1x49
Junos OS Evolved=15.1x49-d10
Junos OS Evolved=15.1x49-d100
Junos OS Evolved=15.1x49-d110
Junos OS Evolved=15.1x49-d120
Junos OS Evolved=15.1x49-d130
Junos OS Evolved=15.1x49-d140
Junos OS Evolved=15.1x49-d15
Junos OS Evolved=15.1x49-d150
Junos OS Evolved=15.1x49-d160
Junos OS Evolved=15.1x49-d170
Junos OS Evolved=15.1x49-d180
Junos OS Evolved=15.1x49-d190
Junos OS Evolved=15.1x49-d20
Junos OS Evolved=15.1x49-d200
Junos OS Evolved=15.1x49-d25
Junos OS Evolved=15.1x49-d30
Junos OS Evolved=15.1x49-d35
Junos OS Evolved=15.1x49-d40
Junos OS Evolved=15.1x49-d45
Junos OS Evolved=15.1x49-d50
Junos OS Evolved=15.1x49-d55
Junos OS Evolved=15.1x49-d60
Junos OS Evolved=15.1x49-d65
Junos OS Evolved=15.1x49-d70
Junos OS Evolved=15.1x49-d75
Junos OS Evolved=15.1x49-d80
Junos OS Evolved=15.1x49-d90
Junos OS Evolved=17.3
Junos OS Evolved=17.3-r1-s1
Junos OS Evolved=17.3-r2
Junos OS Evolved=17.3-r2-s1
Junos OS Evolved=17.3-r2-s2
Junos OS Evolved=17.3-r2-s3
Junos OS Evolved=17.3-r2-s4
Junos OS Evolved=17.3-r3
Junos OS Evolved=17.3-r3-s1
Junos OS Evolved=17.3-r3-s2
Junos OS Evolved=17.3-r3-s3
Junos OS Evolved=17.3-r3-s4
Junos OS Evolved=17.3-r3-s5
Junos OS Evolved=17.3-r3-s6
Junos OS Evolved=17.3-r3-s7
Junos OS Evolved=17.4
Junos OS Evolved=17.4-r1
Junos OS Evolved=17.4-r1-s1
Junos OS Evolved=17.4-r1-s2
Junos OS Evolved=17.4-r1-s4
Junos OS Evolved=17.4-r1-s5
Junos OS Evolved=17.4-r1-s6
Junos OS Evolved=17.4-r1-s7
Junos OS Evolved=17.4-r2
Junos OS Evolved=17.4-r2-s1
Junos OS Evolved=17.4-r2-s2
Junos OS Evolved=17.4-r2-s3
Junos OS Evolved=17.4-r2-s4
Junos OS Evolved=17.4-r2-s5
Junos OS Evolved=17.4-r2-s6
Junos OS Evolved=17.4-r2-s7
Junos OS Evolved=17.4-r2-s8
Junos OS Evolved=17.4-r3
Junos OS Evolved=18.1
Junos OS Evolved=18.1-r2
Junos OS Evolved=18.1-r2-s1
Junos OS Evolved=18.1-r2-s2
Junos OS Evolved=18.1-r2-s4
Junos OS Evolved=18.1-r3
Junos OS Evolved=18.1-r3-s1
Junos OS Evolved=18.1-r3-s2
Junos OS Evolved=18.1-r3-s3
Junos OS Evolved=18.1-r3-s4
Junos OS Evolved=18.1-r3-s6
Junos OS Evolved=18.1-r3-s7
Junos OS Evolved=18.1-r3-s8
Junos OS Evolved=18.1-r3-s9
Junos OS Evolved=18.2
Junos OS Evolved=18.2-r1
Junos OS Evolved=18.2-r1-s3
Junos OS Evolved=18.2-r1-s5
Junos OS Evolved=18.2-r2-s1
Junos OS Evolved=18.2-r2-s2
Junos OS Evolved=18.2-r2-s3
Junos OS Evolved=18.2-r2-s4
Junos OS Evolved=18.2-r2-s5
Junos OS Evolved=18.2-r2-s6
Junos OS Evolved=18.2-r3
Junos OS Evolved=18.2-r3-s1
Junos OS Evolved=18.2-r3-s2
Junos OS Evolved=18.3
Junos OS Evolved=18.3-r1
Junos OS Evolved=18.3-r1-s1
Junos OS Evolved=18.3-r1-s2
Junos OS Evolved=18.3-r1-s3
Junos OS Evolved=18.3-r1-s4
Junos OS Evolved=18.3-r1-s5
Junos OS Evolved=18.3-r1-s6
Junos OS Evolved=18.3-r2
Junos OS Evolved=18.3-r2-s1
Junos OS Evolved=18.3-r2-s2
Junos OS Evolved=18.3-r3
Junos OS Evolved=18.3-r3-s1
Junos OS Evolved=18.4
Junos OS Evolved=18.4-r1
Junos OS Evolved=18.4-r1-s1
Junos OS Evolved=18.4-r1-s2
Junos OS Evolved=18.4-r1-s3
Junos OS Evolved=18.4-r1-s4
Junos OS Evolved=18.4-r1-s5
Junos OS Evolved=18.4-r2
Junos OS Evolved=18.4-r2-s1
Junos OS Evolved=18.4-r2-s2
Junos OS Evolved=18.4-r2-s3
Junos OS Evolved=18.4-r3
Junos OS Evolved=19.1
Junos OS Evolved=19.1-r1
Junos OS Evolved=19.1-r1-s1
Junos OS Evolved=19.1-r1-s2
Junos OS Evolved=19.1-r1-s3
Junos OS Evolved=19.1-r2
Junos OS Evolved=19.2
Junos OS Evolved=19.2-r1
Junos OS Evolved=19.2-r1-s1
Junos OS Evolved=19.2-r1-s2
Junos OS Evolved=19.3-r2
Junos OS Evolved=19.4-r1

Remedy

The following software releases have been updated to resolve this specific issue: 12.3X48-D100, 15.1X49-D210, 16.1R7-S7, 17.3R2-S5, 17.3R3-S8, 17.4R2-S9, 17.4R3-S1, 18.1R3-S10, 18.2R3-S3, 18.3R1-S7, 18.3R3-S2, 18.4R1-S6, 18.4R2-S4, 18.4R3-S1, 19.1R1-S4, 19.1R2-S1, 19.1R3, 19.2R1-S3, 19.2R2, 19.3R2-S1, 19.3R3, 19.4R1-S1, 19.4R2, 20.1R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-1637?

    CVE-2020-1637 is rated as a medium severity vulnerability that can allow unauthorized access to network resources.

  • How do I fix CVE-2020-1637?

    To fix CVE-2020-1637, upgrade your Juniper Networks SRX device to the patched version of Junos OS as specified by the vendor.

  • What devices are affected by CVE-2020-1637?

    CVE-2020-1637 affects Juniper Networks SRX Series devices configured as Junos OS Enforcer devices.

  • What could happen if CVE-2020-1637 is exploited?

    If exploited, CVE-2020-1637 could allow an attacker to gain access to network resources that are not permitted by the User Access Control policy.

  • When was CVE-2020-1637 disclosed?

    CVE-2020-1637 was publicly disclosed as part of Juniper's security advisories and is linked to JSA11018.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203