CVE-2024-39532
EUVD-2024-3805811.07.2024, 17:15
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information. This issue affects: Junos OS: * All versions before 21.2R3-S9; * 21.4 versions before 21.4R3-S9; * 22.2 versions before 22.2R2-S1, 22.2R3; * 22.3 versions before 22.3R1-S1, 22.3R2; Junos OS Evolved: * All versions before before 22.1R3-EVO; * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO; * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos | 𝑥 < 21.2 |
| juniper | junos | 21.2 |
| juniper | junos | 21.2:r1 |
| juniper | junos | 21.2:r1-s1 |
| juniper | junos | 21.2:r1-s2 |
| juniper | junos | 21.2:r2 |
| juniper | junos | 21.2:r2-s1 |
| juniper | junos | 21.2:r2-s2 |
| juniper | junos | 21.2:r3 |
| juniper | junos | 21.2:r3-s1 |
| juniper | junos | 21.2:r3-s2 |
| juniper | junos | 21.2:r3-s3 |
| juniper | junos | 21.2:r3-s4 |
| juniper | junos | 21.2:r3-s5 |
| juniper | junos | 21.2:r3-s6 |
| juniper | junos | 21.2:r3-s7 |
| juniper | junos | 21.2:r3-s8 |
| juniper | junos | 21.4 |
| juniper | junos | 21.4:r1 |
| juniper | junos | 21.4:r1-s1 |
| juniper | junos | 21.4:r1-s2 |
| juniper | junos | 21.4:r2 |
| juniper | junos | 21.4:r2-s1 |
| juniper | junos | 21.4:r2-s2 |
| juniper | junos | 21.4:r3 |
| juniper | junos | 21.4:r3-s1 |
| juniper | junos | 21.4:r3-s2 |
| juniper | junos | 21.4:r3-s3 |
| juniper | junos | 21.4:r3-s4 |
| juniper | junos | 21.4:r3-s5 |
| juniper | junos | 21.4:r3-s6 |
| juniper | junos | 21.4:r3-s7 |
| juniper | junos | 21.4:r3-s8 |
| juniper | junos | 22.2 |
| juniper | junos | 22.2:r1 |
| juniper | junos | 22.2:r1-s1 |
| juniper | junos | 22.2:r1-s2 |
| juniper | junos | 22.2:r2 |
| juniper | junos | 22.2:r3 |
| juniper | junos | 22.3 |
| juniper | junos | 22.3:r1 |
| juniper | junos | 22.3:r2 |
| juniper | junos_os_evolved | 22.1 |
| juniper | junos_os_evolved | 22.1:r1 |
| juniper | junos_os_evolved | 22.1:r1-s1 |
| juniper | junos_os_evolved | 22.1:r1-s2 |
| juniper | junos_os_evolved | 22.1:r2 |
| juniper | junos_os_evolved | 22.1:r2-s1 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2:r1 |
| juniper | junos_os_evolved | 22.2:r1-s1 |
| juniper | junos_os_evolved | 22.2:r1-s2 |
| juniper | junos_os_evolved | 22.2:r2 |
| juniper | junos_os_evolved | 22.2:r3 |
| juniper | junos_os_evolved | 22.3 |
| juniper | junos_os_evolved | 22.3:r1 |
| juniper | junos_os_evolved | 22.3:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration