SARA / Free Tools / CVE / CVE-2019-0053

CVE-2019-0053 — Insufficient validation of environment variables in the telnet client supplied i

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when

CVSS
7.8 HIGH
EPSS
12.00% (top 69.70%)
CWE
CWE-121
Published
2019-07-11T19:40:52.382Z
Last modified
2024-09-16T19:15:29.698Z
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

01What is this vulnerability?

Insufficient validation of environment variables in the telnet client supplied in Junos OS can lead to stack-based buffer overflows, which can be exploited to bypass veriexec restrictions on Junos OS. A stack-based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client — accessible from…

02Affected products

VendorProductVersions
Juniper NetworksJunos OS12.3 versions prior to 12.3R12-S13, 12.3X48 versions prior to 12.3X48-D80, 14.1X53 versions prior to 14.1X53-D130 and 14.1X53-D49, 15.1 versions prior to 15.1F6-S12 and15.1R7-S4, 15.1X49 versions prior to 15.1X49-D170, 15.1X53 versions prior to 15.1X53-D237 and 15.1X53-D496 and 15.1X53-D591 and 15.1X53-D69, 16.1 versions prior to 16.1R3-S11 and 16.1R7-S4, 16.2 versions prior to 16.2R2-S9, 17.1 versions prior to 17.1R3, 17.2 versions prior to 17.2R1-S8 and 17.2R2-S7 and 17.2R3-S1, 17.3 versions prior to 17.3R3-S4, 17.4 versions prior to 17.4R1-S6 and 17.4R2-S3 and 17.4R3, 18.1 versions prior to 18.1R2-S4 and 18.1R3-S3, 18.2 versions prior to 18.2R1-S5 and 18.2R2-S2 and 18.2R3, 18.2X75 versions prior to 18.2X75-D40, 18.3 versions prior to 18.3R1-S3 and 18.3R2, 18.4 versions prior to 18.4R1-S2 and 18.4R2

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →