CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
9.9%
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to ‘root’ leading to a full compromise of the system.
The Junos OS Evolved CLI doesn’t properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.
This issue affects Junos OS Evolved:
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos_os_evolved | * | cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.2 | cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:* |