|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Junos OS EX: privilege escalation via Veriexec Signature
Synthesis of the vulnerability
An attacker can bypass restrictions via Veriexec Signature of Junos OS EX, in order to escalate his privileges.
Impacted software: Juniper EX-Series, Junos OS.
Severity of this computer vulnerability: 2/4.
Consequences of an attack: administrator access/rights, privileged access/rights.
Attacker's origin: user shell.
Creation date: 10/10/2019.
Références of this announce: CERTFR-2019-AVI-500, CVE-2019-0071, JSA10978, VIGILANCE-VUL-30592.
Description of the vulnerability
An attacker can bypass restrictions via Veriexec Signature of Junos OS EX, in or...
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides an application vulnerability database. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.