ID

VAR-202010-0405


CVE

CVE-2020-1674


TITLE

Juniper Networks Junos OS Security hole

Trust: 0.6

sources: CNNVD: CNNVD-202010-676

DESCRIPTION

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a vulnerability. Notes: The fix resolved an issue when MACsec replay-protect was enabled and the replay-protect-window value was set to zero, Junos OS was incorrectly configuring the value to MAX_WINDOW size. Hence this is not a vulnerability and this CVE ID assignment has been withdrawn. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Junos OS that an attacker can exploit to obtain sensitive information by bypassing MACsec delay protection to bypass access restrictions on data. Juniper Networks Junos OS and Junos OS Evolved fail to drop/discard delayed MACsec packets (e.g. delayed by more than 2 seconds). Per the specification, called the "bounded receive delay", there should be no replies to delayed MACsec packets. Any MACsec traffic delayed more than 2 seconds should be dropped and late drop counters should increment. Without MACsec delay protection, an attacker could exploit the delay to spoof or decrypt packets. This issue affects: Juniper Networks Junos OS: 16.1 versions before 16.1R7-S8; 17.2 versions before 17.2R3-S4; 17.3 versions before 17.3R3-S8, 17.3R3-S9; 17.4 versions before 17.4R2-S11, 17.4R3-S2; 18.1 versions before 18.1R3-S11; 18.2 versions before 18.2R3-S5; 18.3 versions before 18.3R2-S4, 18.3R3-S3; 18.4 versions before 18.4R1-S7, 18.4R2-S5, 18.4R3-S3; 19.1 versions before 19.1R3-S2; 19.2 versions before 19.2R1-S5, 19.2R3; 19.3 versions before 19.3R2-S3, 19.3R3; 19.4 versions before 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions before 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: all versions before 19.4R3-EVO; 20.1 versions before 20.1R2-EVO. This issue does not affect Junos OS versions before 16.1R1

Trust: 1.08

sources: NVD: CVE-2020-1674 // VULHUB: VHN-169848 // VULMON: CVE-2020-1674

CVSS

SEVERITY

CVSSV2

CVSSV3

CNNVD: CNNVD-202010-676
value: MEDIUM

Trust: 0.6

VULHUB: VHN-169848
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-1674
value: MEDIUM

Trust: 0.1

VULHUB: VHN-169848
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

VULMON: CVE-2020-1674
severity: MEDIUM
baseScore: 4.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-169848 // VULMON: CVE-2020-1674 // CNNVD: CNNVD-202010-676

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202010-676

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202010-676

PATCH

title:Juniper Networks Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=130748

Trust: 0.6

sources: CNNVD: CNNVD-202010-676

EXTERNAL IDS

db:NVDid:CVE-2020-1674

Trust: 1.8

db:JUNIPERid:JSA11071

Trust: 0.8

db:CNNVDid:CNNVD-202010-676

Trust: 0.7

db:AUSCERTid:ESB-2020.3751

Trust: 0.6

db:VULHUBid:VHN-169848

Trust: 0.1

db:VULMONid:CVE-2020-1674

Trust: 0.1

sources: VULHUB: VHN-169848 // VULMON: CVE-2020-1674 // CNNVD: CNNVD-202010-676 // NVD: CVE-2020-1674

REFERENCES

url:https://kb.juniper.net/jsa11071

Trust: 0.8

url:https://ieeexplore.ieee.org/document/1678345

Trust: 0.8

url:https://www.juniper.net/documentation/en_us/junos/topics/concept/macsec.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-1674

Trust: 0.6

url:https://vigilance.fr/vulnerability/junos-os-information-disclosure-via-macsec-delay-protection-bypass-33591

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3751/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/189880

Trust: 0.1

sources: VULHUB: VHN-169848 // VULMON: CVE-2020-1674 // CNNVD: CNNVD-202010-676

SOURCES

db:VULHUBid:VHN-169848
db:VULMONid:CVE-2020-1674
db:CNNVDid:CNNVD-202010-676
db:NVDid:CVE-2020-1674

LAST UPDATE DATE

2024-08-14T13:24:11.673000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169848date:2021-01-05T00:00:00
db:VULMONid:CVE-2020-1674date:2021-01-05T00:00:00
db:CNNVDid:CNNVD-202010-676date:2021-01-07T00:00:00
db:NVDid:CVE-2020-1674date:2023-11-07T03:19:26.350

SOURCES RELEASE DATE

db:VULHUBid:VHN-169848date:2020-10-16T00:00:00
db:VULMONid:CVE-2020-1674date:2020-10-16T00:00:00
db:CNNVDid:CNNVD-202010-676date:2020-10-15T00:00:00
db:NVDid:CVE-2020-1674date:2020-10-16T21:15:13.317