Authorization Bypass Through User-Controlled Key Vulnerability Affects Juniper Networks Junos OS Evolved Devices
CVE-2024-47495

6.7MEDIUM

Key Information:

Vendor
CVE Published:
11 October 2024

Summary

An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.

This issue affects: Juniper Networks Junos OS Evolved with dual-REs:

  • All versions before 21.2R3-S8-EVO,
  • from 21.4-EVO before 21.4R3-S8-EVO,
  • from 22.2-EVO before 22.2R3-S4-EVO,
  • from 22.3-EVO before 22.3R3-S4-EVO,
  • from 22.4-EVO before 22.4R3-S3-EVO,
  • from 23.2-EVO before 23.2R2-S1-EVO,
  • from 23.4-EVO before 23.4R2-S1-EVO.

This issue does not affect Juniper Networks Junos OS.

Affected Version(s)

Junos OS Evolved 0 < 21.2R3-S8-EVO

Junos OS Evolved 21.4-EVO < 21.4R3-S8-EVO

Junos OS Evolved 22.2-EVO < 22.2R3-S4-EVO

References

CVSS V3.1

Score:
6.7
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.