Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: Withdrawn: 2019-04 Security Bulletin: Junos OS: gRPC hardcoded credentials may allow unauthorized access to systems with Junos Network Agent installed (JSA10918) (CVE-2019-0034)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Juniper Junos OS: Withdrawn: 2019-04 Security Bulletin: Junos OS: gRPC hardcoded credentials may allow unauthorized access to systems with Junos Network Agent installed (JSA10918) (CVE-2019-0034)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/21/2020
Created
09/22/2020
Added
09/21/2020
Modified
09/21/2020

Description

Further investigation has determined that this issue has no impact.  While the credentials exist in affected releases there is no way to exploit this issue, and even if the issue were exploitable, there would be no impact. These credentials existed for specific internal product testing purposes which are not used as part of production releases of Junos OS.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;