Juniper Junos is prone to a local authorization-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions. Versions prior to Junos OS 18.2R1, and 18.2X75-D5 are vulnerable.
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Permit local interactive access to known and trusted individuals only. Use of restricted environments such as chroot and jail may also limit exposure to this and other latent vulnerabilities.
Updates are available. Please see the references or vendor advisory for more information.