Home / Vulnerabilities / CVE-2020-1631
HIGH SEVERITY
CVE-2020-1631 Juniper · Junos OS

Juniper Junos OS Path Traversal Vulnerability

Technical Severity

CVSS v3.1 Metrics

HIGH
8.8 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploitation Likelihood

EPSS Prediction

5.40 %
Predictive Probability
Percentile Rank
89.9 th

Documented as more likely to be exploited than 89.9% of known CVEs.

Detection Date

Mar 25, 2022

Remediation Due

Apr 15, 2022

CISA Catalog Active

Threat Analysis

A path traversal vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform remote code execution.

Remediation Directive

Apply updates per vendor instructions.

External Intelligence