CVE-2019-0071
CVSS V2 High 7.2
CVSS V3 High 7.8
Description
Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system. During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console: Initializing Verified Exec: /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" /sbin/veriexec: Undefined symbol "__aeabi_uidiv" veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error ... This issue affects Juniper Networks Junos OS: 18.1R3-S4 on EX2300, EX2300-C and EX3400; 18.3R1-S3 on EX2300, EX2300-C and EX3400.
Overview
- CVE ID
- CVE-2019-0071
- Assigner
- sirt@juniper.net
- Vulnerability Status
- Analyzed
- Published Version
- 2019-10-09T20:15:18
- Last Modified Date
- 2020-09-29T00:20:49
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- LOCAL
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 7.2
- Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 10
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.8
- Base Severity
- HIGH
- Exploitability Score
- 1.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://kb.juniper.net/JSA10978 | Vendor Advisory |
https://www.juniper.net/documentation/en_US/junos/topics/concept/veriexec.html | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-0071 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0071 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 17:12:17 | Added to TrackCVE | |||
2022-12-04 04:03:51 | 2019-10-09T20:15Z | 2019-10-09T20:15:18 | CVE Published Date | updated |
2022-12-04 04:03:51 | 2020-09-29T00:20:49 | CVE Modified Date | updated | |
2022-12-04 04:03:51 | Analyzed | Vulnerability Status | updated |