Vulnerability Description
Juniper Junos 12.1X44 before 12.1.X44-D20 and 12.1X45 before 12.1X45-D15, when the no-validate option is enabled, does not properly handle configuration validation errors during the config commit phase of the boot-up sequence, which allows remote attackers to bypass authentication via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 12.1x44 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/63389
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10593Vendor Advisory
- http://www.securityfocus.com/bid/63389
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10593Vendor Advisory
FAQ
What is CVE-2013-6012?
CVE-2013-6012 is a vulnerability with a CVSS score of 8.5 (HIGH). Juniper Junos 12.1X44 before 12.1.X44-D20 and 12.1X45 before 12.1X45-D15, when the no-validate option is enabled, does not properly handle configuration validation errors during the config commit phas...
How severe is CVE-2013-6012?
CVE-2013-6012 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6012?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos.