Lucene search

K
nvd[email protected]NVD:CVE-2022-22164
HistoryJan 19, 2022 - 1:15 a.m.

CVE-2022-22164

2022-01-1901:15:08
CWE-665
web.nvd.nist.gov
1
juniper networks
junos os
evolved
telnet service
vulnerability
initialization
security issue

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

32.4%

An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.

Affected configurations

Nvd
Node
juniperjunos_os_evolvedMatch20.4-
OR
juniperjunos_os_evolvedMatch20.4r1
OR
juniperjunos_os_evolvedMatch20.4r1-s1
OR
juniperjunos_os_evolvedMatch20.4r1-s2
OR
juniperjunos_os_evolvedMatch20.4r2
OR
juniperjunos_os_evolvedMatch20.4r2-s1
OR
juniperjunos_os_evolvedMatch20.4r2-s2
OR
juniperjunos_os_evolvedMatch20.4r2-s3
OR
juniperjunos_os_evolvedMatch20.4r3-s1
OR
juniperjunos_os_evolvedMatch21.1-
OR
juniperjunos_os_evolvedMatch21.2-
VendorProductVersionCPE
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*
juniperjunos_os_evolved20.4cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*
juniperjunos_os_evolved21.1cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*
Rows per page:
1-10 of 111

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

32.4%

Related for NVD:CVE-2022-22164