{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T16:16:21.313","vulnerabilities":[{"cve":{"id":"CVE-2018-0044","sourceIdentifier":"sirt@juniper.net","published":"2018-10-10T18:29:00.530","lastModified":"2024-11-21T03:37:25.180","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPasswords option set to \"yes\". Affected releases are Juniper Networks Junos OS: 18.1 versions prior to 18.1R4 on NFX Series."},{"lang":"es","value":"Una configuración SSHD insegura en Juniper Device Manager (JDM) y el sistema operativo del host en dispositivos Juniper NFX Series podría permitir el acceso remoto no autenticado si cualquiera de las contraseñas en el sistema está vacía. La configuración SSHD afectada tiene la opción PermitEmptyPasswords establecida como \"yes\". Las versiones afectadas de Juniper Networks Junos OS son: versiones 18.1 anteriores a la 18.1R4 en NFX Series."}],"metrics":{"cvssMetricV30":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*","versionStartIncluding":"18.1r1","versionEndIncluding":"18.1r3","matchCriteriaId":"B02AC7C6-A207-484A-B4BA-6A4A36A22C02"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*","matchCriteriaId":"D9AE81FA-B0F3-4F0B-A2D1-2BB590345058"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*","versionStartIncluding":"18.1r1","versionEndIncluding":"18.1r3","matchCriteriaId":"B02AC7C6-A207-484A-B4BA-6A4A36A22C02"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*","matchCriteriaId":"7EB08A27-7777-4538-ADC4-9D2F89963C13"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105565","source":"sirt@juniper.net","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kb.juniper.net/JSA10878","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105565","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kb.juniper.net/JSA10878","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}