Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.106040
Category:JunOS Local Security Checks
Title:Juniper Networks Junos OS Fail-Open Unauthenticated Root Access Vulnerability
Summary:Junos OS is prone to a unauthenticated root access vulnerability.
Description:Summary:
Junos OS is prone to a unauthenticated root access vulnerability.

Vulnerability Insight:
When the pam.conf file is corrupted in certain ways, it may allow
connection to the device as the root user with no password. This 'fail-open' behavior allows an
attacker who can specifically modify the file to gain full access to the device. Note that inadvertent
manipulation of the pam.conf by an authorized administrator can also lead to unauthenticated root
access to the device.

Vulnerability Impact:
When the pam.conf file is corrupted in certain ways attackers may
connect as root user with no password.

Affected Software/OS:
Junos OS 12.1, 12.3, 13.2, 13.3, and 14.1

Solution:
New builds of Junos OS software are available from Juniper.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-7751
http://www.securitytracker.com/id/1033817
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.