Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2021-0231

CVE information

Published

3 years ago

Last Modified

2 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

A path traversal vulnerability in the Juniper Networks SRX and vSRX Series may allow an authenticated J-web user to read sensitive system files. This issue affects Juniper Networks Junos OS on SRX and vSRX Series: 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S3, 20.2R2; This issue does not affect Juniper Networks Junos OS versions prior to 19.3R1..

CVSSv2.0 Score

Severity
Medium
Base Score
6.8/10
Exploit Score
8/10
Access Vector
Network
Access Complexity
Low
Authentication Required
Single
Impact Score
6.9/10
Confidentiality Impact
Complete
Availability Impact
None
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
6.5/10
Exploit Score
2.8/10
Access Vector
Network
Access Complexity
Low
Privileges Required
Low
Impact Score
3.6/10
Confidentiality Impact
High
Availability Impact
None
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*
  No
-