CVE-2018-0044

NFX Series: Insecure sshd configuration in Juniper Device Manager (JDM) and host OS

Description

An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPasswords option set to "yes". Affected releases are Juniper Networks Junos OS: 18.1 versions prior to 18.1R4 on NFX Series.

Remediation

Solution:

  • PermitEmptyPasswords option has been set to no by default in the fixed versions of Junos OS. The following software releases have been updated to resolve this specific issue: 18.1R4, 18.2R1 and all subsequent releases.

Workaround:

  • Ensure all the accounts on the JDM and host OS are configured with a password.
  • Ensure that /etc/ssh/sshd_config file on JDM and host OS have the configuration PermitEmptyPasswords no

Category

9.8
CVSS
Severity: Critical
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.42%
Vendor Advisory juniper.net
Affected: Juniper Networks Junos OS
Published at:
Updated at:

References

Link Tags
https://kb.juniper.net/JSA10878 vendor advisory
http://www.securityfocus.com/bid/105565 vdb entry third party advisory

Frequently Asked Questions

What is the severity of CVE-2018-0044?
CVE-2018-0044 has been scored as a critical severity vulnerability.
How to fix CVE-2018-0044?
To fix CVE-2018-0044: PermitEmptyPasswords option has been set to no by default in the fixed versions of Junos OS. The following software releases have been updated to resolve this specific issue: 18.1R4, 18.2R1 and all subsequent releases.
Is CVE-2018-0044 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2018-0044 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2018-0044?
CVE-2018-0044 affects Juniper Networks Junos OS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.