Lucene search

K
nvd[email protected]NVD:CVE-2024-39521
HistoryJul 11, 2024 - 4:15 p.m.

CVE-2024-39521

2024-07-1116:15:03
CWE-78
web.nvd.nist.gov
3
cve-2024-39521
juniper networks junos os
command options
privilege escalation
system compromise
21.1-evo
21.4-evo
22.1-evo
22.2-evo
22.3-evo

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.9%

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to ‘root’ leading to a full compromise of the system.

The Junos OS Evolved CLI doesn’t properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.

This issue affects Junos OS Evolved:

  • 21.1-EVO versions 21.1R1-EVO and later before 21.2R3-S8-EVO,
  • 21.4-EVO versions before 21.4R3-S7-EVO,
  • 22.1-EVO versions before 22.1R3-S6-EVO,
  • 22.2-EVO versions before 22.2R3-EVO,
  • 22.3-EVO versions before 22.3R2-EVO.

Affected configurations

Nvd
Node
juniperjunos_os_evolvedRange21.121.2
OR
juniperjunos_os_evolvedMatch21.2-
OR
juniperjunos_os_evolvedMatch21.2r1
OR
juniperjunos_os_evolvedMatch21.2r1-s1
OR
juniperjunos_os_evolvedMatch21.2r1-s2
OR
juniperjunos_os_evolvedMatch21.2r2
OR
juniperjunos_os_evolvedMatch21.2r2-s1
OR
juniperjunos_os_evolvedMatch21.2r2-s2
OR
juniperjunos_os_evolvedMatch21.2r3
OR
juniperjunos_os_evolvedMatch21.2r3-s1
OR
juniperjunos_os_evolvedMatch21.2r3-s2
OR
juniperjunos_os_evolvedMatch21.2r3-s3
OR
juniperjunos_os_evolvedMatch21.2r3-s4
OR
juniperjunos_os_evolvedMatch21.2r3-s5
OR
juniperjunos_os_evolvedMatch21.2r3-s6
OR
juniperjunos_os_evolvedMatch21.2r3-s7
OR
juniperjunos_os_evolvedMatch21.4-
OR
juniperjunos_os_evolvedMatch21.4r1
OR
juniperjunos_os_evolvedMatch21.4r1-s1
OR
juniperjunos_os_evolvedMatch21.4r1-s2
OR
juniperjunos_os_evolvedMatch21.4r2
OR
juniperjunos_os_evolvedMatch21.4r2-s1
OR
juniperjunos_os_evolvedMatch21.4r2-s2
OR
juniperjunos_os_evolvedMatch21.4r3
OR
juniperjunos_os_evolvedMatch21.4r3-s1
OR
juniperjunos_os_evolvedMatch21.4r3-s2
OR
juniperjunos_os_evolvedMatch21.4r3-s3
OR
juniperjunos_os_evolvedMatch21.4r3-s4
OR
juniperjunos_os_evolvedMatch21.4r3-s5
OR
juniperjunos_os_evolvedMatch21.4r3-s6
OR
juniperjunos_os_evolvedMatch21.4r3-s7
OR
juniperjunos_os_evolvedMatch22.2-
OR
juniperjunos_os_evolvedMatch22.2r1
OR
juniperjunos_os_evolvedMatch22.2r1-s1
OR
juniperjunos_os_evolvedMatch22.2r2
OR
juniperjunos_os_evolvedMatch22.2r2-s2
OR
juniperjunos_os_evolvedMatch22.3-
OR
juniperjunos_os_evolvedMatch22.3r1
OR
juniperjunos_os_evolvedMatch22.3r1-s1
OR
juniperjunos_os_evolvedMatch22.3r1-s2
VendorProductVersionCPE
juniperjunos_os_evolved*cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*
juniperjunos_os_evolved21.2cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*
Rows per page:
1-10 of 401

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.9%

Related for NVD:CVE-2024-39521