CVE-2024-39522

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system.

The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level.


This issue affects Junos OS Evolved:



  *  22.3-EVO versions before 22.3R2-EVO,
  *  22.4-EVO versions before 22.4R1-S1-EVO, 22.4R2-EVO.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
juniperCNA
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
juniperjunos_os_evolved
22.3r2 <
𝑥
< 22.3r2
juniperjunos_os_evolved
22.4r2 <
𝑥
< 22.4r2
juniperjunos_os_evolved
22.4r1-s2 <
𝑥
< 22.4r1-s2
juniperjunos_os_evolved
22.3
juniperjunos_os_evolved
22.3:r1
juniperjunos_os_evolved
22.3:r1-s1
juniperjunos_os_evolved
22.3:r1-s2
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
𝑥
= Vulnerable software versions