CVE-2014-6384

Current Description

Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 does not properly handle double quotes in authorization attributes in the TACACS+ configuration, which allows local users to bypass the security policy and execute commands via unspecified vectors.

Basic Data

PublishedJanuary 16, 2015
Last ModifiedJanuary 26, 2015
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score6.9
SeverityMEDIUM
Exploitability Score3.4
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSJuniperJunos12.1x44*******
    2.3OSJuniperJunos12.1x44d10******
    2.3OSJuniperJunos12.1x44d15******
    2.3OSJuniperJunos12.1x44d20******
    2.3OSJuniperJunos12.1x44d25******
    2.3OSJuniperJunos12.1x44d30******
    2.3OSJuniperJunos12.1x44d35******
    2.3OSJuniperJunos12.1x44d40******
    2.3OSJuniperJunos12.1x46*******
    2.3OSJuniperJunos12.1x46d10******
    2.3OSJuniperJunos12.1x46d15******
    2.3OSJuniperJunos12.1x46d20******
    2.3OSJuniperJunos12.1x47*******
    2.3OSJuniperJunos12.1x47d10******
    2.3OSJuniperJunos12.3*******
    2.3OSJuniperJunos12.3r1******
    2.3OSJuniperJunos12.3r2******
    2.3OSJuniperJunos12.3r3******
    2.3OSJuniperJunos12.3r4******
    2.3OSJuniperJunos12.3r5******
    2.3OSJuniperJunos12.3r6******
    2.3OSJuniperJunos12.3r7******
    2.3OSJuniperJunos12.3r8******
    2.3OSJuniperJunos13.1*******
    2.3OSJuniperJunos13.1r1******
    2.3OSJuniperJunos13.1r2******
    2.3OSJuniperJunos13.1r3******
    2.3OSJuniperJunos13.1r4******
    2.3OSJuniperJunos13.2*******
    2.3OSJuniperJunos13.2r1******
    2.3OSJuniperJunos13.2r2******
    2.3OSJuniperJunos13.2r3******
    2.3OSJuniperJunos13.2r4******
    2.3OSJuniperJunos13.2r5******
    2.3OSJuniperJunos13.3*******
    2.3OSJuniperJunos13.3r1******
    2.3OSJuniperJunos13.3r2******
    2.3OSJuniperJunos13.3r3******
    2.3OSJuniperJunos13.3r4******
    2.3OSJuniperJunos14.1*******
    2.3OSJuniperJunos14.1r1******
    2.3OSJuniperJunos14.1r2******
    2.3OSJuniperJunos14.2*******

Vulnerable Software List

VendorProductVersions
Juniper Junos 12.1x44, 12.1x46, 12.1x47, 12.3, 13.1, 13.2, 13.3, 14.1, 14.2

References

NameSourceURLTags
72077http://www.securityfocus.com/bid/72077BID
1031547http://www.securitytracker.com/id/1031547SECTRACK
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667CONFIRMVendor Advisory