Vulnerability Description
Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 does not properly handle double quotes in authorization attributes in the TACACS+ configuration, which allows local users to bypass the security policy and execute commands via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 12.1x44 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/72077
- http://www.securitytracker.com/id/1031547
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667Vendor Advisory
- http://www.securityfocus.com/bid/72077
- http://www.securitytracker.com/id/1031547
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10667Vendor Advisory
FAQ
What is CVE-2014-6384?
CVE-2014-6384 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D15, 12.3 before 12.3R9, 13.1 before 13.1R4-S3, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3,...
How severe is CVE-2014-6384?
CVE-2014-6384 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6384?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos.