Published:2020/01/10  Last Updated:2020/01/10

Junos OS vulnerable to directory traversal


Junos OS provided by Juniper Networks, Inc. contains a directory traversal vulnerability.

Products Affected

  • Junos OS 12.3 versions prior to 12.3R12-S13
  • Junos OS 12.3X48 versions prior to 12.3X48-D85 on SRX Series
  • Junos OS 14.1X53 versions prior to 14.1X53-D51
  • Junos OS 15.1F6 versions prior to 15.1F6-S13
  • Junos OS 15.1 versions prior to 15.1R7-S5
  • Junos OS 15.1X49 versions prior to 15.1X49-D180 on SRX Series
  • Junos OS 15.1X53 versions prior to 15.1X53-D238 on QFX5200/QFX5110 Series
  • Junos OS 16.1 versions prior to 16.1R4-S13, 16.1R7-S5
  • Junos OS 16.2 versions prior to 16.2R2-S10
  • Junos OS 17.1 versions prior to 17.1R3-S1
  • Junos OS 17.2 versions prior to 17.2R1-S9, 17.2R3-S2
  • Junos OS 17.3 versions prior to 17.3R2-S5, 17.3R3-S5
  • Junos OS 17.4 versions prior to 17.4R2-S9, 17.4R3
  • Junos OS 18.1 versions prior to 18.1R3-S8
  • Junos OS 18.2 versions prior to 18.2R3
  • Junos OS 18.3 versions prior to 18.3R2-S3, 18.3R3
  • Junos OS 18.4 versions prior to 18.4R2
  • Junos OS 19.1 versions prior to 19.1R1-S4, 19.1R


Junos OS contains a directory traversal vulnerability (CWE-22).


Files on the server may be viewed or deleted by an authenticated J-web user.

According to the developer, this issue does not affect system files that can be accessed only by root user.


Update the Software
Update the software to the latest version according to the information provided by the developer.

Apply a Workaround
Applying a workaround listed below may mitigate the impacts of the vulnerability.

  • Limit access to the J-Web interface to only trusted users

Vendor Status


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Base Score: 5.4
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
Base Score: 5.5
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)


Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2020-1606
JVN iPedia JVNDB-2020-000002