Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2r3j-v23v-hx4j

Опубликовано: 09 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 6.5

Описание

An Authentication Bypass by Primary Weakness

in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device. When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory.

This issue affects Junos OS: 

  • all versions before 22.4R3-S8,
  • 23.2 versions before 23.2R2-S3,
  • 23.4 versions before 23.4R2.

An Authentication Bypass by Primary Weakness

in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device. When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory.

This issue affects Junos OS: 

  • all versions before 22.4R3-S8,
  • 23.2 versions before 23.2R2-S3,
  • 23.4 versions before 23.4R2.

EPSS

Процентиль: 15%
0.00049
Низкий

6.9 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-305

Связанные уязвимости

CVSS3: 6.5
nvd
4 месяца назад

An Authentication Bypass by Primary Weakness in the FTP server of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to get limited read-write access to files on the device. When the FTP server is enabled and a user named "ftp" or "anonymous" is configured, that user can login without providing the configured password and then has read-write access to their home directory. This issue affects Junos OS:  * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S3, * 23.4 versions before 23.4R2.

EPSS

Процентиль: 15%
0.00049
Низкий

6.9 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-305