{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Juniper Networks SBR Carrier versions 8.5.x ant\u00e9rieures \u00e0 8.5.0R4","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2 et 19.3","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D12 sur s\u00e9ries QFX5100 et EX4600","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 R1912","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Juniper Networks SBR Carrier versions ant\u00e9rieures \u00e0 8.4.1R19","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos Space versions ant\u00e9rieures \u00e0 19.4R1","product":{"name":"Junos Space","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 17.2R3-S3, 17.3R2-S5, 17.3R3-S5, 17.4R2-S7, 17.4R3, 18.1R3-S6, 18.2R3-S2, 18.2X75-D51, 18.2X75-D60, 18.3R3, 18.4R2, 19.1R1-S3, 19.1R2, 19.2R1-S2, 19.2R2 et 19.3R1 sur s\u00e9ries MX","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D48, 15.1R7-S3, 16.1R7, 17.1R3, 17.2R3, 17.3R2-S5, 17.3R3, 17.4R2, 18.1R3, 18.2R2 et 18.3R1 sur s\u00e9rie EX4300","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D52 sur s\u00e9ries QFX3500","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S13, 12.3R12-S15, 12.3X48-D85, 12.3X48-D86, 12.3X48-D90, 14.1X53-D51, 15.1F6-S13, 15.1F6-S13,15.1R7-S5, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X53-D238, 15.1X53-D496, 15.1X53-D592, 16.1R4-S13, 16.1R7-S4, 16.1R7-S5, 16.1R7-S6, 16.2R2-S10, 16.2R2-S10,17.1R2-S11, 16.2R2-S11, 16.2R2-S9, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.2R1-S9, 17.2R2-S8, 17.2R3-S2, 17.2R3-S3, 17.3R2-S5, 17.3R2-S6, 17.3R3-S3, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R2-S2, 17.4R2-S4, 17.4R2-S5, 17.4R2-S6, 17.4R2-S9, 17.4R3, 18.1R3-S2, 18.1R3-S5, 18.1R3-S7, 18.1R3-S7,18.2R2-S5, 18.1R3-S8, 18.2R2-S6, 18.2R3, 18.2R3-S2, 18.2X75-D40, 18.2X75-D410, 18.2X75-D50, 18.3R1-S6, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.4R1-S2, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S2, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.2R1, 19.2R1-S2, 19.2R2 et 19.3R1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-12749","url":"https://www.cve.org/CVERecord?id=CVE-2019-12749"},{"name":"CVE-2019-1125","url":"https://www.cve.org/CVERecord?id=CVE-2019-1125"},{"name":"CVE-2019-17267","url":"https://www.cve.org/CVERecord?id=CVE-2019-17267"},{"name":"CVE-2019-11091","url":"https://www.cve.org/CVERecord?id=CVE-2019-11091"},{"name":"CVE-2018-0737","url":"https://www.cve.org/CVERecord?id=CVE-2018-0737"},{"name":"CVE-2019-1071","url":"https://www.cve.org/CVERecord?id=CVE-2019-1071"},{"name":"CVE-2020-1611","url":"https://www.cve.org/CVERecord?id=CVE-2020-1611"},{"name":"CVE-2018-1336","url":"https://www.cve.org/CVERecord?id=CVE-2018-1336"},{"name":"CVE-2018-0739","url":"https://www.cve.org/CVERecord?id=CVE-2018-0739"},{"name":"CVE-2015-5621","url":"https://www.cve.org/CVERecord?id=CVE-2015-5621"},{"name":"CVE-2018-5743","url":"https://www.cve.org/CVERecord?id=CVE-2018-5743"},{"name":"CVE-2014-2310","url":"https://www.cve.org/CVERecord?id=CVE-2014-2310"},{"name":"CVE-2018-9568","url":"https://www.cve.org/CVERecord?id=CVE-2018-9568"},{"name":"CVE-2019-12735","url":"https://www.cve.org/CVERecord?id=CVE-2019-12735"},{"name":"CVE-2019-11810","url":"https://www.cve.org/CVERecord?id=CVE-2019-11810"},{"name":"CVE-2020-1606","url":"https://www.cve.org/CVERecord?id=CVE-2020-1606"},{"name":"CVE-2007-5846","url":"https://www.cve.org/CVERecord?id=CVE-2007-5846"},{"name":"CVE-2019-9636","url":"https://www.cve.org/CVERecord?id=CVE-2019-9636"},{"name":"CVE-2020-1608","url":"https://www.cve.org/CVERecord?id=CVE-2020-1608"},{"name":"CVE-2020-1602","url":"https://www.cve.org/CVERecord?id=CVE-2020-1602"},{"name":"CVE-2018-12127","url":"https://www.cve.org/CVERecord?id=CVE-2018-12127"},{"name":"CVE-2019-19919","url":"https://www.cve.org/CVERecord?id=CVE-2019-19919"},{"name":"CVE-2017-17805","url":"https://www.cve.org/CVERecord?id=CVE-2017-17805"},{"name":"CVE-2018-17972","url":"https://www.cve.org/CVERecord?id=CVE-2018-17972"},{"name":"CVE-2008-6123","url":"https://www.cve.org/CVERecord?id=CVE-2008-6123"},{"name":"CVE-2020-1601","url":"https://www.cve.org/CVERecord?id=CVE-2020-1601"},{"name":"CVE-2017-2595","url":"https://www.cve.org/CVERecord?id=CVE-2017-2595"},{"name":"CVE-2016-7061","url":"https://www.cve.org/CVERecord?id=CVE-2016-7061"},{"name":"CVE-2019-5489","url":"https://www.cve.org/CVERecord?id=CVE-2019-5489"},{"name":"CVE-2017-12174","url":"https://www.cve.org/CVERecord?id=CVE-2017-12174"},{"name":"CVE-2018-12130","url":"https://www.cve.org/CVERecord?id=CVE-2018-12130"},{"name":"CVE-2019-9824","url":"https://www.cve.org/CVERecord?id=CVE-2019-9824"},{"name":"CVE-2017-3735","url":"https://www.cve.org/CVERecord?id=CVE-2017-3735"},{"name":"CVE-2020-1607","url":"https://www.cve.org/CVERecord?id=CVE-2020-1607"},{"name":"CVE-2012-6151","url":"https://www.cve.org/CVERecord?id=CVE-2012-6151"},{"name":"CVE-2019-14835","url":"https://www.cve.org/CVERecord?id=CVE-2019-14835"},{"name":"CVE-2018-0732","url":"https://www.cve.org/CVERecord?id=CVE-2018-0732"},{"name":"CVE-2019-1073","url":"https://www.cve.org/CVERecord?id=CVE-2019-1073"},{"name":"CVE-2020-1604","url":"https://www.cve.org/CVERecord?id=CVE-2020-1604"},{"name":"CVE-2016-7055","url":"https://www.cve.org/CVERecord?id=CVE-2016-7055"},{"name":"CVE-2018-12126","url":"https://www.cve.org/CVERecord?id=CVE-2018-12126"},{"name":"CVE-2020-1603","url":"https://www.cve.org/CVERecord?id=CVE-2020-1603"},{"name":"CVE-2008-4309","url":"https://www.cve.org/CVERecord?id=CVE-2008-4309"},{"name":"CVE-2019-1559","url":"https://www.cve.org/CVERecord?id=CVE-2019-1559"},{"name":"CVE-2014-3565","url":"https://www.cve.org/CVERecord?id=CVE-2014-3565"},{"name":"CVE-2020-1609","url":"https://www.cve.org/CVERecord?id=CVE-2020-1609"},{"name":"CVE-2020-1605","url":"https://www.cve.org/CVERecord?id=CVE-2020-1605"},{"name":"CVE-2020-1600","url":"https://www.cve.org/CVERecord?id=CVE-2020-1600"}],"links":[],"reference":"CERTFR-2020-AVI-015","revisions":[{"description":"Version initiale","revision_date":"2020-01-09T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10992 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10992&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10986 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10986&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10985 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10985&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10980 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10980&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10981 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10983 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10983&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10979 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10979&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10987 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10987&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10982 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10982&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10990 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10990&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10991 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10991&cat=SIRT_1&actp=LIST"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10993 du 08 janvier 2020","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10993&cat=SIRT_1&actp=LIST"}]}
