Vulnerability Details : CVE-2013-5096
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privilege, aka PR 863804.
Exploit prediction scoring system (EPSS) score for CVE-2013-5096
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 46 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-5096
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2013-5096
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5096
-
http://kb.juniper.net/JSA10585
Juniper Networks - 2013-08 Security Bulletin: Junos Space: Multiple VulnerabilitiesVendor Advisory
-
http://www.securitytracker.com/id/1028923
Juniper Junos Space Bugs Let Remote Users Conduct Cross-Site Scripting Attacks and Remote Authenticated Users Modify the Configuration and Obtain Authentication Information - SecurityTracker
-
http://www.securityfocus.com/bid/61794
Juniper Networks JUNOS Space CVE-2013-5096 Security Bypass Vulnerability
Products affected by CVE-2013-5096
- cpe:2.3:a:juniper:junos_space:12.2:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space:12.1:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space:12.3:*:*:*:*:*:*:*
- cpe:2.3:h:juniper:junos_space_ja1500_appliance:-:*:*:*:*:*:*:*
- cpe:2.3:a:juniper:junos_space_virtual_appliance:-:*:*:*:*:*:*:*