Physical Access Control Vulnerability Allows Attacker Access to User Accounts
CVE-2024-39512
6.6MEDIUM
Key Information
- Vendor
- Juniper Networks
- Status
- Junos Os Evolved
- Vendor
- CVE Published:
- 10 July 2024
Badges
👾 Exploit Exists
Summary
An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to resume a previous session and possibly gain administrative privileges. This issue affects Junos OS Evolved: * from 23.2R2-EVO before 23.2R2-S1-EVO, * from 23.4R1-EVO before 23.4R2-EVO.
Affected Version(s)
Junos OS Evolved < 23.2R2-S1-EVO
Junos OS Evolved < 23.4R2-EVO
CVSS V3.1
Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
- 👾
Exploit exists.
Collectors
NVD DatabaseMitre Database