CVE-2024-39522
EUVD-2024-3804811.07.2024, 16:15
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * 22.3-EVO versions before 22.3R2-EVO, * 22.4-EVO versions before 22.4R1-S1-EVO, 22.4R2-EVO.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos_os_evolved | 22.3 |
| juniper | junos_os_evolved | 22.3:r1 |
| juniper | junos_os_evolved | 22.3:r1-s1 |
| juniper | junos_os_evolved | 22.3:r1-s2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4:r1 |
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| juniper | junos_os_evolved | 22.3 ≤ 𝑥 < 22.3r2 | ADP |
| juniper | junos_os_evolved | 22.4 ≤ 𝑥 < 22.4r2 | ADP |
| juniper | junos_os_evolved | 22.4 ≤ 𝑥 < 22.4r1-s2 | ADP |