{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Junos Space versions ant\u00e9rieures \u00e0 19.2R1","product":{"name":"Junos Space","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Juniper Secure Analytics (JSA) versions ant\u00e9rieures \u00e0 7.3.2 Patch 1","product":{"name":"Secure Analytics","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3X48-D80, 12.3X48-D85, 12.3X48-D90, 14.1X53-D130, 14.1X53-D49, 14.1X53-D51, 15.1F6-S12, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X49-D171, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X53-D237, 15.1X53-D238, 15.1X53-D496, 15.1X53-D591, 15.1X53-D69, 16.1R3-S11, 16.1R7-S3, 16.1R7-S4, 16.1R7-S5, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3, 17.2R3-S1, 17.2X75-D105, 17.3R3-S2, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R1-S8, 17.4R2-S2, 17.4R2-S3, 17.4R2-S4, 17.4R2-S5, 17.4R3, 18.1R2-S4, 18.1R3-S2, 18.1R3-S3, 18.1R3-S5, 18.1R3-S6, 18.2R1-S5, 18.2R2, 18.2R2-S1, 18.2R2-S2, 18.2R2-S3, 18.2R3, 18.2X75-D12, 18.2X75-D30, 18.2X75-D40, 18.2X75-D50, 18.3R1-S2, 18.3R1-S3, 18.3R1-S4, 18.3R2, 18.4R1, 18.4R1-S1, 18.4R1-S2, 18.4R2, 19.1R1, 19.1R1-S1, 19.1R2 et 19.2R1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D115, 14.1X53-D51, 16.1R7-S5, 17.1R3, 17.2R3, 17.2R3-S2, 17.3R3-S2, 17.3R3-S3, 17.4R2, 17.4R2-S5, 17.4R3, 18.1R3, 18.1R3-S1, 18.2R2, 18.3R1, 18.3R2 et 18.4R1 sur s\u00e9ries EX4300","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS avec J-Web activ\u00e9 versions ant\u00e9rieures \u00e0 12.3R12-S14, 12.3X48-D80, 15.1F6-S13, 15.1R7-S4, 15.1X49-D170, 15.1X53-D497, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3, 17.2R2-S7, 17.2R3-S1, 17.3R3-S5, 17.4R1-S7, 17.4R2-S4, 17.4R3, 18.1R3-S5 et 18.2R1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-8615","url":"https://www.cve.org/CVERecord?id=CVE-2016-8615"},{"name":"CVE-2019-0049","url":"https://www.cve.org/CVERecord?id=CVE-2019-0049"},{"name":"CVE-2018-1060","url":"https://www.cve.org/CVERecord?id=CVE-2018-1060"},{"name":"CVE-2016-8619","url":"https://www.cve.org/CVERecord?id=CVE-2016-8619"},{"name":"CVE-2018-15505","url":"https://www.cve.org/CVERecord?id=CVE-2018-15505"},{"name":"CVE-2018-0739","url":"https://www.cve.org/CVERecord?id=CVE-2018-0739"},{"name":"CVE-2018-10902","url":"https://www.cve.org/CVERecord?id=CVE-2018-10902"},{"name":"CVE-2019-0048","url":"https://www.cve.org/CVERecord?id=CVE-2019-0048"},{"name":"CVE-2016-8624","url":"https://www.cve.org/CVERecord?id=CVE-2016-8624"},{"name":"CVE-2016-8616","url":"https://www.cve.org/CVERecord?id=CVE-2016-8616"},{"name":"CVE-2016-8620","url":"https://www.cve.org/CVERecord?id=CVE-2016-8620"},{"name":"CVE-2016-8617","url":"https://www.cve.org/CVERecord?id=CVE-2016-8617"},{"name":"CVE-2019-0053","url":"https://www.cve.org/CVERecord?id=CVE-2019-0053"},{"name":"CVE-2016-8618","url":"https://www.cve.org/CVERecord?id=CVE-2016-8618"},{"name":"CVE-2019-5739","url":"https://www.cve.org/CVERecord?id=CVE-2019-5739"},{"name":"CVE-2019-0052","url":"https://www.cve.org/CVERecord?id=CVE-2019-0052"},{"name":"CVE-2016-8623","url":"https://www.cve.org/CVERecord?id=CVE-2016-8623"},{"name":"CVE-2019-0046","url":"https://www.cve.org/CVERecord?id=CVE-2019-0046"},{"name":"CVE-2018-12327","url":"https://www.cve.org/CVERecord?id=CVE-2018-12327"},{"name":"CVE-2018-11237","url":"https://www.cve.org/CVERecord?id=CVE-2018-11237"},{"name":"CVE-2016-8621","url":"https://www.cve.org/CVERecord?id=CVE-2016-8621"},{"name":"CVE-2018-1061","url":"https://www.cve.org/CVERecord?id=CVE-2018-1061"},{"name":"CVE-2018-0732","url":"https://www.cve.org/CVERecord?id=CVE-2018-0732"},{"name":"CVE-2019-1559","url":"https://www.cve.org/CVERecord?id=CVE-2019-1559"},{"name":"CVE-2018-15504","url":"https://www.cve.org/CVERecord?id=CVE-2018-15504"},{"name":"CVE-2016-8622","url":"https://www.cve.org/CVERecord?id=CVE-2016-8622"},{"name":"CVE-2019-6133","url":"https://www.cve.org/CVERecord?id=CVE-2019-6133"},{"name":"CVE-2016-8625","url":"https://www.cve.org/CVERecord?id=CVE-2016-8625"},{"name":"CVE-2018-1729","url":"https://www.cve.org/CVERecord?id=CVE-2018-1729"}],"links":[],"reference":"CERTFR-2019-AVI-325","revisions":[{"description":"Version initiale","revision_date":"2019-07-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10938 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10938&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10946 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10946&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10942 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10942&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10949 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10949&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10943 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10943&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10951 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10951&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10950 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10950&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10948 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10948&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10947 du 10 juillet 2019","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10947&cat=SIRT_1&actp=LIST"}]}
