CVE-2024-47495

An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.

This issue affects:
Juniper Networks Junos OS Evolved with dual-REs:
  *  All versions before 21.2R3-S8-EVO,
  *  from 21.4-EVO before 21.4R3-S8-EVO,
  *  from 22.2-EVO before 22.2R3-S4-EVO,
  *  from 22.3-EVO before 22.3R3-S4-EVO,
  *  from 22.4-EVO before 22.4R3-S3-EVO,
  *  from 23.2-EVO before 23.2R2-S1-EVO,
  *  from 23.4-EVO before 23.4R2-S1-EVO.



This issue does not affect Juniper Networks Junos OS.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
juniperCNA
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
VendorProductVersion
juniperjunos_evolved
𝑥
< 21.2r3-s8-evo
juniperjunos_evolved
21.4r3-s8-evo <
𝑥
< 21.4r3-s8-evo
juniperjunos_evolved
22.2r3-s4-evo <
𝑥
< 22.2r3-s4-evo
juniperjunos_evolved
22.3r3-s4-evo <
𝑥
< 22.3r3-s4-evo
juniperjunos_evolved
22.4r3-s3-evo <
𝑥
< 22.4r3-s3-evo
juniperjunos_evolved
23.2r2-s1-evo <
𝑥
< 23.2r2-s1-evo
𝑥
= Vulnerable software versions