CVE-2018-0059
moderate-risk
Published 2018-10-10
A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.4/10
Medium
NETWORK
/ LOW complexity
Affected Products (20)
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Netscreen Screenos
Affected Vendors
References (2)
Vendor Advisory
https://kb.juniper.net/JSA10894
Vendor Advisory
https://kb.juniper.net/JSA10894
44
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
1/34 · Minimal
Exposure
22/34 · High