Published:2020/01/10  Last Updated:2020/01/10

Junos OS vulnerable to cross-site scripting


Junos OS provided by Juniper Networks, Inc. contains a cross-site scripting vulnerability.

Products Affected

  • Junos OS 12.3 versions prior to 12.3R12-S15 on EX and QFX Series
  • Junos OS 12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90 on SRX Series
  • Junos OS 14.1X53 versions prior to 14.1X53-D51 on EX and QFX Series
  • Junos OS 15.1F6 versions prior to 15.1F6-S13
  • Junos OS 15.1 versions prior to 15.1R7-S5
  • Junos OS 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190 on SRX Series
  • Junos OS 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 Series
  • Junos OS 15.1X53 versions prior to 15.1X53-D592 on EX2300/EX3400 Series
  • Junos OS 16.1 versions prior to 16.1R4-S13, 16.1R7-S5
  • Junos OS 16.2 versions prior to 16.2R2-S10
  • Junos OS 17.1 versions prior to 17.1R2-S11, 17.1R3-S1
  • Junos OS 17.2 versions prior to 17.2R1-S9, 17.2R3-S2
  • Junos OS 17.3 versions prior to 17.3R2-S5, 17.3R3-S5
  • Junos OS 17.4 versions prior to 17.4R2-S6, 17.4R3
  • Junos OS 18.1 versions prior to 18.1R3-S7
  • Junos OS 18.2 versions prior to 18.2R2-S5, 18.2R3
  • Junos OS 18.3 versions prior to 18.3R1-S6, 18.3R2-S1, 18.3R3
  • Junos OS 18.4 versions prior to 18.4R1-S5, 18.4R2
  • Junos OS 19.1 versions prior to 19.1R1-S2, 19.1R2


Junos OS contains a cross-site scripting vulnerability (CWE-79).


An arbitrary script may be executed on the user's J-Web screen.


Update the Software
Update the software to the latest version according to the information provided by the developer.

Apply a Workaround
Applying workarounds listed below may mitigate the impacts of the vulnerability.

  • Access the J-Web service from trusted hosts which may not be compromised by cross-site scripting attacks (e.g. deploying jump hosts with no internet access)
  • Disable J-Web

Vendor Status


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Base Score: 6.1
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
Base Score: 2.6
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)


Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2020-1607
JVN iPedia JVNDB-2020-000003