The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability announce CVE-2019-0071

Junos OS EX: privilege escalation via Veriexec Signature

Synthesis of the vulnerability

An attacker can bypass restrictions via Veriexec Signature of Junos OS EX, in order to escalate his privileges.
Impacted software: Juniper EX-Series, Junos OS.
Severity of this computer vulnerability: 2/4.
Consequences of an attack: administrator access/rights, privileged access/rights.
Attacker's origin: user shell.
Creation date: 10/10/2019.
Références of this announce: CERTFR-2019-AVI-500, CVE-2019-0071, JSA10978, VIGILANCE-VUL-30592.

Description of the vulnerability

An attacker can bypass restrictions via Veriexec Signature of Junos OS EX, in or...
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides an application vulnerability database. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.