Juniper Junos is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges. Juniper Junos 12.3X48 versions prior to 12.3X48-D80 are vulnerable
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Ensure that only trusted users have local, interactive access to affected computers.
To limit the consequences of successful exploits, run the server in a closed or restricted environment.
To limit the impact of a successful exploit, run server software with the least privileges required and in restricted environments while still maintaining functionality.
Updates are available. Please see the references or vendor advisory for more information.