Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:juniper:junos_space:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "61A323AE-7C8D-49F3-BB47-15DEBAFC86BD", "vulnerable": true}, {"criteria": "cpe:2.3:a:juniper:junos_space:11.2:*:*:*:*:*:*:*", "matchCriteriaId": "EAEC058B-C096-455B-9A75-5191E00A367D", "vulnerable": true}, {"criteria": "cpe:2.3:a:juniper:junos_space:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6E79208-AF42-48D9-990C-E2E2E1DE8E1E", "vulnerable": true}, {"criteria": "cpe:2.3:a:juniper:junos_space:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DA5E2C05-12C0-48B6-BE84-0A045B2A2B91", "vulnerable": true}, {"criteria": "cpe:2.3:a:juniper:junos_space:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "167749D0-F3B8-48F3-BFC8-37A531E48C16", "vulnerable": true}, {"criteria": "cpe:2.3:a:juniper:junos_space:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D4C754E5-ACBB-45DE-B983-0888A8EB7CD3", "vulnerable": true}, {"criteria": "cpe:2.3:a:juniper:junos_space:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "84E7CE7F-4410-461D-9381-B186789B6509", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:juniper:junos_space_virtual_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8EA74-6BD3-461C-9D08-EF1024EC0E5A", "vulnerable": true}, {"criteria": "cpe:2.3:h:juniper:junos_space_ja1500_appliance:-:*:*:*:*:*:*:*", "matchCriteriaId": "C58939FC-742F-4A93-8977-6953B32E6817", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privilege, aka PR 863804."}, {"lang": "es", "value": "Juniper Junos Space anterior a v13.1R1.6, como es usado en JA1500 y en otros contextos, no aplica correctamente el control de acceso basado en roles, lo que permite a usuarios remotos autenticados modificar la configuraci\u00f3n mediante el aprovechamiento del privilegio de s\u00f3lo lectura, tambi\u00e9n conocido como PR 863804."}], "id": "CVE-2013-5096", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-08-16T14:01:36.577", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://kb.juniper.net/JSA10585"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/61794"}, {"source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1028923"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://kb.juniper.net/JSA10585"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61794"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1028923"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}