Stack-Based Buffer Overflow Vulnerability Affects Junos OS and Junos OS Evolved
CVE-2024-39556
7HIGH
Key Information:
- Vendor
- Juniper Networks
- Status
- Vendor
- CVE Published:
- 10 July 2024
Summary
A stack-based buffer overflow vulnerability in Juniper Networks Junos OS and Junos OS Evolved could enable an attacker with low privileges and local access to the command line interface (CLI) to execute malicious operations. By utilizing the 'set security certificates' command alongside a specially crafted certificate file, an attacker might trigger a crash of the management daemon (mgd) or even facilitate execution of arbitrary privileged code, posing a significant risk to system integrity.
Affected Version(s)
Junos OS 0 < 21.4R3-S7
Junos OS 22.1 < 22.1R3-S6
Junos OS 22.2 < 22.2R3-S4
References
CVSS V3.1
Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved