Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-22164 (GCVE-0-2022-22164)
Vulnerability from cvelistv5
- CWE-665 - Improper Initialization
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS Evolved |
Version: unspecified < 20.4R2-S2-EVO Version: 21.1R1-EVO < 21.1* Version: 21.2 < 21.2R2-EVO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:49.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA11272" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Junos OS Evolved", "vendor": "Juniper Networks", "versions": [ { "lessThan": "20.4R2-S2-EVO", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "21.1*", "status": "affected", "version": "21.1R1-EVO", "versionType": "custom" }, { "lessThan": "21.2R2-EVO", "status": "affected", "version": "21.2", "versionType": "custom" } ] } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-19T00:21:10", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA11272" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R2-S2-EVO, 21.2R2-EVO, 21.3R1-EVO and all subsequent releases." } ], "source": { "advisory": "JSA11272", "defect": [ "1596411" ], "discovery": "USER" }, "title": "Junos OS Evolved: Telnet service may be enabled when it is expected to be disabled.", "workarounds": [ { "lang": "en", "value": "To work around the issue, the xinetd service can be restarted manually using one of the commands below: \n\n user@device% systemctl restart xinetd\nor\n user@device% systemctl restart services-xinetd\n\nAdditionally, loopback/firewall filters can be applied to disable remote access to the telnet service." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-22164", "STATE": "PUBLIC", "TITLE": "Junos OS Evolved: Telnet service may be enabled when it is expected to be disabled." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS Evolved", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "20.4R2-S2-EVO" }, { "version_affected": "\u003e=", "version_name": "21.1", "version_value": "21.1R1-EVO" }, { "version_affected": "\u003c", "version_name": "21.2", "version_value": "21.2R2-EVO" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-665 Improper Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11272", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA11272" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R2-S2-EVO, 21.2R2-EVO, 21.3R1-EVO and all subsequent releases." } ], "source": { "advisory": "JSA11272", "defect": [ "1596411" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "To work around the issue, the xinetd service can be restarted manually using one of the commands below: \n\n user@device% systemctl restart xinetd\nor\n user@device% systemctl restart services-xinetd\n\nAdditionally, loopback/firewall filters can be applied to disable remote access to the telnet service." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2022-22164", "datePublished": "2022-01-19T00:21:10.263727Z", "dateReserved": "2021-12-21T00:00:00", "dateUpdated": "2024-09-16T22:46:51.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22164\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2022-01-19T01:15:08.787\",\"lastModified\":\"2024-11-21T06:46:17.657\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de inicializaci\u00f3n inapropiada en Juniper Networks Junos OS Evolved puede causar que una operaci\u00f3n de confirmaci\u00f3n para deshabilitar el servicio telnet no tenga el efecto esperado, lo que hace que el servicio telnet siga habilitado. Cuando no est\u00e1 previsto que funcione en el dispositivo, un administrador puede emitir el siguiente comando para verificar si telnet est\u00e1 funcionando en segundo plano: user@device ) show system connections | grep :23 tcp 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd Este problema afecta: Juniper Networks Junos OS Evolved Todas las versiones anteriores a 20.4R2-S2-EVO; 21.1 versi\u00f3n 21.1R1-EVO y versiones posteriores; versiones 21.2 anteriores a 21.2R2-EVO\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-665\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-665\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"247FB9DF-7EC0-4298-B27C-3235D141C1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C8866D-162F-4C9B-8167-2FBA25410368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85E5BC7-8607-4330-AA72-2273D32F8604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"878C81C9-A418-4A21-8FDB-2116A992679C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7451A671-A3CC-4904-8D45-947B1D3783C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0108AD20-EAE6-41D1-AE48-254C46B5388A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E554FD12-FE69-44D1-B2C9-4382F8CA4456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C3552E-798F-4719-B38D-F74E34EAAA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"620B0CDD-5566-472E-B96A-31D2C12E3120\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA11272\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA11272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
var-202201-0895
Vulnerability from variot
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO. Juniper Networks Junos OS Evolved Has an initialization vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0895", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos os evolved", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "20.4" }, { "model": "junos os evolved", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "21.2" }, { "model": "junos os evolved", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "21.1" }, { "model": "junos os evolved", "scope": "eq", "trust": 0.8, "vendor": "\u30b8\u30e5\u30cb\u30d1\u30fc\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9", "version": null }, { "model": "junos os evolved", "scope": null, "trust": 0.8, "vendor": "\u30b8\u30e5\u30cb\u30d1\u30fc\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "NVD", "id": "CVE-2022-22164" } ] }, "cve": "CVE-2022-22164", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22164", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409693", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-22164", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "sirt@juniper.net", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2022-22164", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22164", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22164", "trust": 1.0, "value": "MEDIUM" }, { "author": "sirt@juniper.net", "id": "CVE-2022-22164", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-22164", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202201-917", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-409693", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22164", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409693" }, { "db": "VULMON", "id": "CVE-2022-22164" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "CNNVD", "id": "CNNVD-202201-917" }, { "db": "NVD", "id": "CVE-2022-22164" }, { "db": "NVD", "id": "CVE-2022-22164" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO. Juniper Networks Junos OS Evolved Has an initialization vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-22164" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "VULHUB", "id": "VHN-409693" }, { "db": "VULMON", "id": "CVE-2022-22164" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22164", "trust": 3.4 }, { "db": "JUNIPER", "id": "JSA11272", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2022-003894", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2022011235", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-917", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-409693", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22164", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409693" }, { "db": "VULMON", "id": "CVE-2022-22164" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "CNNVD", "id": "CNNVD-202201-917" }, { "db": "NVD", "id": "CVE-2022-22164" } ] }, "id": "VAR-202201-0895", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409693" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:10:56.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA11272", "trust": 0.8, "url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164?language=en_US" }, { "title": "Juniper Networks Junos OS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=183778" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22164" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "CNNVD", "id": "CNNVD-202201-917" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-665", "trust": 1.1 }, { "problemtype": "Improper initialization (CWE-665) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409693" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "NVD", "id": "CVE-2022-22164" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://kb.juniper.net/jsa11272" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22164" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022011235" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/junos-os-multiple-vulnerabilities-37234" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/665.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409693" }, { "db": "VULMON", "id": "CVE-2022-22164" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "CNNVD", "id": "CNNVD-202201-917" }, { "db": "NVD", "id": "CVE-2022-22164" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409693" }, { "db": "VULMON", "id": "CVE-2022-22164" }, { "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "db": "CNNVD", "id": "CNNVD-202201-917" }, { "db": "NVD", "id": "CVE-2022-22164" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "VULHUB", "id": "VHN-409693" }, { "date": "2022-01-19T00:00:00", "db": "VULMON", "id": "CVE-2022-22164" }, { "date": "2023-03-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "date": "2022-01-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-917" }, { "date": "2022-01-19T01:15:08.787000", "db": "NVD", "id": "CVE-2022-22164" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-26T00:00:00", "db": "VULHUB", "id": "VHN-409693" }, { "date": "2022-01-26T00:00:00", "db": "VULMON", "id": "CVE-2022-22164" }, { "date": "2023-03-10T05:55:00", "db": "JVNDB", "id": "JVNDB-2022-003894" }, { "date": "2022-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-917" }, { "date": "2024-11-21T06:46:17.657000", "db": "NVD", "id": "CVE-2022-22164" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-917" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper\u00a0Networks\u00a0Junos\u00a0OS\u00a0Evolved\u00a0 Initialization vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003894" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-917" } ], "trust": 0.6 } }
fkie_cve-2022-22164
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
URL | Tags | ||
---|---|---|---|
sirt@juniper.net | https://kb.juniper.net/JSA11272 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA11272 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 20.4 | |
juniper | junos_os_evolved | 21.1 | |
juniper | junos_os_evolved | 21.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*", "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*", "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*", "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*", "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*", "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*", "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*", "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*", "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*", "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*", "matchCriteriaId": "52C3552E-798F-4719-B38D-F74E34EAAA40", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO." }, { "lang": "es", "value": "Una vulnerabilidad de inicializaci\u00f3n inapropiada en Juniper Networks Junos OS Evolved puede causar que una operaci\u00f3n de confirmaci\u00f3n para deshabilitar el servicio telnet no tenga el efecto esperado, lo que hace que el servicio telnet siga habilitado. Cuando no est\u00e1 previsto que funcione en el dispositivo, un administrador puede emitir el siguiente comando para verificar si telnet est\u00e1 funcionando en segundo plano: user@device ) show system connections | grep :23 tcp 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd Este problema afecta: Juniper Networks Junos OS Evolved Todas las versiones anteriores a 20.4R2-S2-EVO; 21.1 versi\u00f3n 21.1R1-EVO y versiones posteriores; versiones 21.2 anteriores a 21.2R2-EVO" } ], "id": "CVE-2022-22164", "lastModified": "2024-11-21T06:46:17.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "sirt@juniper.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-19T01:15:08.787", "references": [ { "source": "sirt@juniper.net", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/JSA11272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/JSA11272" } ], "sourceIdentifier": "sirt@juniper.net", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "sirt@juniper.net", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2022-22164
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-22164", "description": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled.\n\nWhen it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background:\n user@device \u003e show system connections | grep :23\n tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd\nThis issue affects:\nJuniper Networks Junos OS Evolved\nAll versions prior to 20.4R2-S2-EVO;\n21.1 version 21.1R1-EVO and later versions;\n21.2 versions prior to 21.2R2-EVO.", "id": "GSD-2022-22164" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-22164" ], "details": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.", "id": "GSD-2022-22164", "modified": "2023-12-13T01:19:28.929309Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-22164", "STATE": "PUBLIC", "TITLE": "Junos OS Evolved: Telnet service may be enabled when it is expected to be disabled." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS Evolved", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "20.4R2-S2-EVO" }, { "version_affected": "\u003e=", "version_name": "21.1", "version_value": "21.1R1-EVO" }, { "version_affected": "\u003c", "version_name": "21.2", "version_value": "21.2R2-EVO" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO." } ] }, "exploit": [ { "lang": "eng", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-665 Improper Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11272", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA11272" } ] }, "solution": [ { "lang": "eng", "value": "The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R2-S2-EVO, 21.2R2-EVO, 21.3R1-EVO and all subsequent releases.\n" } ], "source": { "advisory": "JSA11272", "defect": [ "1596411" ], "discovery": "USER" }, "work_around": [ { "lang": "eng", "value": "To work around the issue, the xinetd service can be restarted manually using one of the commands below: \n\n user@device% systemctl restart xinetd\nor\n user@device% systemctl restart services-xinetd\n\nAdditionally, loopback/firewall filters can be applied to disable remote access to the telnet service.\n" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "ID": "CVE-2022-22164" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-665" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11272", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/JSA11272" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2022-01-26T02:21Z", "publishedDate": "2022-01-19T01:15Z" } } }
ghsa-56fg-32qc-v967
Vulnerability from github
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.
{ "affected": [], "aliases": [ "CVE-2022-22164" ], "database_specific": { "cwe_ids": [ "CWE-665" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-19T01:15:00Z", "severity": "MODERATE" }, "details": "An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device \u003e show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.", "id": "GHSA-56fg-32qc-v967", "modified": "2022-01-27T00:03:49Z", "published": "2022-01-20T00:01:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22164" }, { "type": "WEB", "url": "https://kb.juniper.net/JSA11272" } ], "schema_version": "1.4.0", "severity": [] }
CERTFR-2022-AVI-040
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration versions antérieures à 6.1.0 Patch 3 | ||
Juniper Networks | N/A | Junos sur MX versions 21.2 antérieures à 21.2R2 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.4 antérieures à 20.4R2-S2 ou 20.4R3 | ||
Juniper Networks | N/A | Junos sur MX SPC3 et SRX versions 18.3 antérieures à 18.3R3 | ||
Juniper Networks | N/A | Junos sur MX versions 20.4 antérieures à 20.4R3 | ||
Juniper Networks | N/A | Junos versions 19.4 antérieures à 19.4R3-S6 | ||
Juniper Networks | N/A | Junos sur MX SPC3 et SRX versions 19.2 antérieures à 19.2R1-S1 ou 19.2R2 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S2 | ||
Juniper Networks | N/A | Junos versions 18.2 depuis 18.2R3-S6 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.1 antérieures à 20.1R3-S1 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.4 antérieures à 19.4R1-S3 ou 19.4R2-S2 ou 19.4R3 | ||
Juniper Networks | N/A | Junos Evolved versions 21.2 antérieures à 21.2R2-EVO | ||
Juniper Networks | N/A | Junos versions 17.3 depuis 17.3R3-S9 antérieures à 17.3R3-S12 | ||
Juniper Networks | N/A | Junos sur SRX versions 18.4 antérieures à 18.4R2-S10 ou 18.4R3-S10 | ||
Juniper Networks | N/A | Junos sur MX versions 19.4 antérieures à 19.4R3-S5 | ||
Juniper Networks | N/A | Junos versions 20.4 antérieures à 20.4R3-S1 | ||
Juniper Networks | N/A | Junos versions 18.1 depuis 18.1R3-S11 antérieures à 18.1R3-S13 | ||
Juniper Networks | N/A | Junos sur MX versions 20.2 antérieures à 20.2R3-S3 | ||
N/A | N/A | Junos sur MX SPC3 et SRX versions antérieures à 18.2R3 | ||
Juniper Networks | N/A | Junos versions 18.3 depuis 18.3R3-S4 antérieures à 18.3R3-S5 | ||
Juniper Networks | N/A | Junos versions 19.4 antérieures à 19.4R2-S5 ou 19.4R3-S5 | ||
N/A | N/A | Junos sur MX SPC3 et SRX versions 19.1 antérieures à 19.1R2 | ||
Juniper Networks | N/A | Junos versions 16.1R1 antérieures à 18.4R3-S10 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R1-S7 ou 19.2R3-S3 | ||
Juniper Networks | N/A | Junos versions 20.4 antérieures à 20.4R2 | ||
Juniper Networks | N/A | Junos versions 20.4 antérieures à 20.4R2-S2 ou 20.4R3 | ||
N/A | N/A | Junos sur MX versions 20.3 antérieures à 20.3R3-S2 | ||
Juniper Networks | N/A | Junos versions 20.1 antérieures à 20.1R2-S2 ou 20.1R3 | ||
Juniper Networks | N/A | Junos versions 20.2 antérieures à 20.2R3-S3 | ||
Juniper Networks | N/A | Junos sur SRX versions 21.1 antérieures à 21.1R2-S2 ou 21.1R3 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur MX versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos versions 19.4 antérieures à 19.4R3-S7 | ||
Juniper Networks | N/A | Junos Evolved versions antérieures à 20.4R2-S2-EVO | ||
Juniper Networks | N/A | Junos sur MX versions 19.1 antérieures à 19.1R2-S3 ou 19.1R3-S7 | ||
Juniper Networks | N/A | Junos sur MX SPC3 et SRX versions 18.4 antérieures à 18.4R2-S9 ou 18.4R3 | ||
N/A | N/A | Junos versions 19.3 antérieures à 19.3R3-S4 | ||
Juniper Networks | N/A | Junos versions 19.1 depuis 19.1R3-S3 antérieures à 19.1R3-S7 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 21.1 antérieures à 21.1R2-S1 ou 21.1R3 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R2-S2 ou 21.1R3 | ||
Juniper Networks | N/A | Junos sur SRX versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos versions 19.3 antérieures à 19.3R2-S7 ou 19.3R3-S4 | ||
Juniper Networks | N/A | Junos version 20.4 antérieures à 20.4R3 | ||
Juniper Networks | N/A | Junos sur MX versions 19.3 antérieures à 19.3R3-S4 | ||
Juniper Networks | N/A | Junos versions 18.4 depuis 18.4R3-S5 antérieures à 18.4R3-S9 | ||
Juniper Networks | N/A | Junos sur SRX versions 19.3 antérieures à 19.3R3-S3 | ||
Juniper Networks | N/A | Junos versions 20.1 antérieures à 20.1R3-S1 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos sur SRX versions 19.1 antérieures à 19.1R3-S8 | ||
Juniper Networks | N/A | Junos version 18.4 antérieures à 18.4R3-S9 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 19.3 antérieures à 19.3R3-S5 | ||
N/A | N/A | Junos sur SRX versions 19.4 antérieures à 19.4R3-S5 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R2-S1 ou 21.1R3 | ||
Juniper Networks | N/A | Junos versions 18.4 antérieures à 18.4R2-S9 ou 18.4R3-S9 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R2 | ||
Juniper Networks | N/A | Junos version 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S3 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.1 antérieures à 19.1R3-S5 | ||
Juniper Networks | N/A | Junos versions antérieures à 18.3R3-S6 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R1-S7 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos version 19.4 antérieures à 19.4R3-S5 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.2 antérieures à 20.2R3-S2 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R3-S4 | ||
Juniper Networks | N/A | Junos sur SRX versions 21.2 antérieures à 21.2R2 | ||
Juniper Networks | N/A | Junos version 20.2 antérieures à 20.2R3-S2 | ||
Juniper Networks | N/A | Junos Evolved versions 21.1 depuis 21.1R1-EVO | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.4 antérieures à 20.4R3 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.1 antérieures à 20.1R3-S2 | ||
Juniper Networks | N/A | Junos versions 18.4 antérieures à 18.4R2-S9 ou 18.4R3-S10 | ||
Juniper Networks | N/A | Junos version 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 19.4 antérieures à 19.4R2-S5 ou 19.4R3-S6 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R1-S1 ou 21.1R2 | ||
Juniper Networks | N/A | Junos versions 19.1 antérieures à 19.1R3-S7 | ||
Juniper Networks | N/A | Junos version 21.1 antérieures à 21.1R2 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R3 | ||
Juniper Networks | N/A | Junos versions 20.2 antérieures à 20.2R3 | ||
Juniper Networks | N/A | Junos version 21.2 antérieures à 21.2R2 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 18.4 antérieures à 18.4R3-S10 | ||
Juniper Networks | N/A | Junos version 20.1 antérieures à 20.1R3-S1 | ||
Juniper Networks | N/A | Junos versions 19.1 antérieures à 19.1R2-S3 ou 19.1R3-S7 | ||
N/A | N/A | Junos sur vMX et MX150 versions 21.2 antérieures à 21.2R1-S1 ou 21.2R2 | ||
Juniper Networks | N/A | Junos versions 15.1 antérieures à 15.1R7-S11 | ||
Juniper Networks | N/A | Junos versions 17.4 depuis 17.4R3-S3 antérieures à 17.4R3-S5 | ||
Juniper Networks | N/A | Junos versions antérieures à 15.1R7-S11 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.3 antérieures à 19.3R2-S6 ou 19.3R3-S2 | ||
Juniper Networks | N/A | Junos versions 20.1 antérieures à 20.1R3-S2 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 21.3 antérieures à 21.3R1-S1 ou 21.3R2 | ||
Juniper Networks | N/A | Junos sur MX versions 16.1 depuis 16.1R1 antérieures à 18.4R3-S10 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 20.1 antérieures à 20.1R2 | ||
Juniper Networks | N/A | Junos versions antérieures à 18.4R2-S9 ou 18.4R3-S9 | ||
Juniper Networks | N/A | Junos version 19.1 antérieures à 19.1R2-S3 ou 19.1R3-S7 | ||
Juniper Networks | N/A | Junos sur MX versions 20.1 antérieures à 20.1R3-S3 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.2 antérieures à 20.2R3-S3 | ||
Juniper Networks | N/A | Junos versions 21.2 antérieures à 21.2R1-S1 ou 21.2R2 | ||
Juniper Networks | N/A | Junos versions 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur MX versions 21.1 antérieures à 21.1R3 | ||
Juniper Networks | N/A | Junos versions 20.3 antérieures à 20.3R2-S1 ou 20.3R3 | ||
Juniper Networks | N/A | Junos versions 20.2 antérieures à 20.2R3-S2 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 20.2 antérieures à 20.2R1-S1 ou 20.2R2 | ||
Juniper Networks | N/A | Junos versions 18.3 antérieures à 18.3R3-S6 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper Networks Contrail Service Orchestration versions ant\u00e9rieures \u00e0 6.1.0 Patch 3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 21.2 ant\u00e9rieures \u00e0 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.4 ant\u00e9rieures \u00e0 20.4R2-S2 ou 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 18.3 ant\u00e9rieures \u00e0 18.3R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.4 ant\u00e9rieures \u00e0 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S1 ou 19.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.2 depuis 18.2R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.4 ant\u00e9rieures \u00e0 19.4R1-S3 ou 19.4R2-S2 ou 19.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Evolved versions 21.2 ant\u00e9rieures \u00e0 21.2R2-EVO", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 17.3 depuis 17.3R3-S9 ant\u00e9rieures \u00e0 17.3R3-S12", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S10 ou 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.1 depuis 18.1R3-S11 ant\u00e9rieures \u00e0 18.1R3-S13", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions ant\u00e9rieures \u00e0 18.2R3", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 18.3 depuis 18.3R3-S4 ant\u00e9rieures \u00e0 18.3R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.4 ant\u00e9rieures \u00e0 19.4R2-S5 ou 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 19.1 ant\u00e9rieures \u00e0 19.1R2", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 16.1R1 ant\u00e9rieures \u00e0 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S7 ou 19.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.4 ant\u00e9rieures \u00e0 20.4R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.4 ant\u00e9rieures \u00e0 20.4R2-S2 ou 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S2", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 20.1 ant\u00e9rieures \u00e0 20.1R2-S2 ou 20.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S2 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Evolved versions ant\u00e9rieures \u00e0 20.4R2-S2-EVO", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.1 ant\u00e9rieures \u00e0 19.1R2-S3 ou 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S4", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 19.1 depuis 19.1R3-S3 ant\u00e9rieures \u00e0 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S1 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S2 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.3 ant\u00e9rieures \u00e0 19.3R2-S7 ou 19.3R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.4 ant\u00e9rieures \u00e0 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.4 depuis 18.4R3-S5 ant\u00e9rieures \u00e0 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S8", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 18.4 ant\u00e9rieures \u00e0 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S1 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions ant\u00e9rieures \u00e0 18.3R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S7 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 19.4 ant\u00e9rieures \u00e0 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 21.2 ant\u00e9rieures \u00e0 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.2 ant\u00e9rieures \u00e0 20.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Evolved versions 21.1 depuis 21.1R1-EVO", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.4 ant\u00e9rieures \u00e0 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 19.4 ant\u00e9rieures \u00e0 19.4R2-S5 ou 19.4R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R1-S1 ou 21.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 21.1 ant\u00e9rieures \u00e0 21.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.2 ant\u00e9rieures \u00e0 20.2R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 21.2 ant\u00e9rieures \u00e0 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 18.4 ant\u00e9rieures \u00e0 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.1 ant\u00e9rieures \u00e0 20.1R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.1 ant\u00e9rieures \u00e0 19.1R2-S3 ou 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 21.2 ant\u00e9rieures \u00e0 21.2R1-S1 ou 21.2R2", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 15.1 ant\u00e9rieures \u00e0 15.1R7-S11", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 17.4 depuis 17.4R3-S3 ant\u00e9rieures \u00e0 17.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions ant\u00e9rieures \u00e0 15.1R7-S11", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.3 ant\u00e9rieures \u00e0 19.3R2-S6 ou 19.3R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 21.3 ant\u00e9rieures \u00e0 21.3R1-S1 ou 21.3R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 16.1 depuis 16.1R1 ant\u00e9rieures \u00e0 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 20.1 ant\u00e9rieures \u00e0 20.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 19.1 ant\u00e9rieures \u00e0 19.1R2-S3 ou 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.2 ant\u00e9rieures \u00e0 21.2R1-S1 ou 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 21.1 ant\u00e9rieures \u00e0 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.3 ant\u00e9rieures \u00e0 20.3R2-S1 ou 20.3R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 20.2 ant\u00e9rieures \u00e0 20.2R1-S1 ou 20.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.3 ant\u00e9rieures \u00e0 18.3R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-22155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22155" }, { "name": "CVE-2022-22163", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22163" }, { "name": "CVE-2022-22160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22160" }, { "name": "CVE-2022-22154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22154" }, { "name": "CVE-2022-22162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22162" }, { "name": "CVE-2022-22153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22153" }, { "name": "CVE-2022-22152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22152" }, { "name": "CVE-2022-22161", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22161" }, { "name": "CVE-2022-22168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22168" }, { "name": "CVE-2022-22164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22164" }, { "name": "CVE-2022-22169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22169" }, { "name": "CVE-2022-22167", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22167" }, { "name": "CVE-2022-22157", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22157" }, { "name": "CVE-2022-22166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22166" }, { "name": "CVE-2022-22156", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22156" }, { "name": "CVE-2022-22159", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22159" } ], "initial_release_date": "2022-01-13T00:00:00", "last_revision_date": "2022-01-13T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-040", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11271 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11271\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11265 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11265\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11270 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11270\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11262 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11262\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11275 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11275\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11274 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11274\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11263 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11263\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11276 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11276\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11260 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11260\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11269 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11269\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11261 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11261\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11272\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11264 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11264\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11268 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11268\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11267 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11267\u0026cat=SIRT_1\u0026actp=LIST" } ] }
CERTFR-2024-AVI-0027
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | CTPView versions versions antérieures à 9.1R5 | ||
Juniper Networks | Junos OS Evolved | Junos OS Evolved version antérieures à 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO | ||
Juniper Networks | N/A | Paragon Active Assurance versions antérieures à 3.1.2, 3.2.3, 3.3.2 et 3.4.1 | ||
Juniper Networks | Junos OS | Junos OS version antérieures à 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1 | ||
Juniper Networks | Session Smart Router | Session Smart Router versions antérieures à SSR-6.2.3-r2 | ||
Juniper Networks | N/A | Security Director Insights versions antérieures à 23.1R1 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "CTPView versions versions ant\u00e9rieures \u00e0 9.1R5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS Evolved version ant\u00e9rieures \u00e0 20.4R2-EVO, 20.4R2-S2-EVO, 20.4R3-EVO, 20.4R3-S7-EVO, 21.1R2-EVO, 21.2R2-EVO, 21.2R3-S7-EVO, 21.3R2-EVO, 21.3R3-S5-EVO, 21.4R3-EVO, 21.4R3-S3-EVO, 21.4R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-EVO, 22.1R3-S2-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R2-S1-EVO, 22.2R2-S2-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.3R1-EVO, 22.3R2-EVO, 22.3R3-EVO, 22.3R3-S1-EVO, 22.4R1-EVO, 22.4R2-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.1R2-EVO, 23.2R1-EVO, 23.2R1-S1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.3R1-EVO et 23.4R1-EVO", "product": { "name": "Junos OS Evolved", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Paragon Active Assurance versions ant\u00e9rieures \u00e0 3.1.2, 3.2.3, 3.3.2 et 3.4.1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS version ant\u00e9rieures \u00e0 20.4R3-S3, 20.4R3-S6, 20.4R3-S7, 20.4R3-S8, 20.4R3-S9, 21.1R3-S4, 21.1R3-S5, 21.2R3, 21.2R3-S3, 21.2R3-S4, 21.2R3-S5, 21.2R3-S6, 21.2R3-S7, 21.3R2-S1, 21.3R3, 21.3R3-S3, 21.3R3-S4, 21.3R3-S5, 21.4R2, 21.4R3, 21.4R3-S3, 21.4R3-S4, 21.4R3-S5, 22.1R2, 22.1R2-S2, 22.1R3, 22.1R3-S1, 22.1R3-S2, 22.1R3-S3, 22.1R3-S4, 22.2R1, 22.2R2, 22.2R2-S1, 22.2R2-S2, 22.2R3, 22.2R3-S1, 22.2R3-S2, 22.2R3-S3, 22.3R1, 22.3R2, 22.3R2-S1, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.4R1, 22.4R1-S2, 22.4R2, 22.4R2-S1, 22.4R2-S2, 22.4R3, 23.1R1, 23.1R2, 23.2R1, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.3R1 et 23.4R1", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Session Smart Router versions ant\u00e9rieures \u00e0 SSR-6.2.3-r2", "product": { "name": "Session Smart Router", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Security Director Insights versions ant\u00e9rieures \u00e0 23.1R1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-3707", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3707" }, { "name": "CVE-2024-21602", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21602" }, { "name": "CVE-2022-41974", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41974" }, { "name": "CVE-2023-38802", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38802" }, { "name": "CVE-2023-21938", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21938" }, { "name": "CVE-2023-21843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21843" }, { "name": "CVE-2022-42720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42720" }, { "name": "CVE-2022-30594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30594" }, { "name": "CVE-2022-41973", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41973" }, { "name": "CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "name": "CVE-2024-21616", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21616" }, { "name": "CVE-2021-25220", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220" }, { "name": "CVE-2023-2235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2235" }, { "name": "CVE-2023-23454", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23454" }, { "name": "CVE-2023-21954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21954" }, { "name": "CVE-2022-2964", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2964" }, { "name": "CVE-2023-21939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21939" }, { "name": "CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "name": "CVE-2024-21599", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21599" }, { "name": "CVE-2022-47929", "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929" }, { "name": "CVE-2022-3628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3628" }, { "name": "CVE-2024-21614", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21614" }, { "name": "CVE-2023-21830", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21830" }, { "name": "CVE-2023-3817", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817" }, { "name": "CVE-2023-26464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26464" }, { "name": "CVE-2020-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0466" }, { "name": "CVE-2021-26691", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691" }, { "name": "CVE-2022-4269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4269" }, { "name": "CVE-2022-42703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42703" }, { "name": "CVE-2024-21607", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21607" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2023-32067", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067" }, { "name": "CVE-2023-0266", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0266" }, { "name": "CVE-2019-17571", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17571" }, { "name": "CVE-2022-39189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189" }, { "name": "CVE-2022-3239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3239" }, { "name": "CVE-2022-43750", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750" }, { "name": "CVE-2022-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3567" }, { "name": "CVE-2023-2828", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2828" }, { "name": "CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "name": "CVE-2023-22081", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22081" }, { "name": "CVE-2023-20569", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20569" }, { "name": "CVE-2024-21596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21596" }, { "name": "CVE-2022-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3564" }, { "name": "CVE-2021-33656", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33656" }, { "name": "CVE-2023-1582", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1582" }, { "name": "CVE-2022-4129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4129" }, { "name": "CVE-2022-41218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41218" }, { "name": "CVE-2023-2194", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2194" }, { "name": "CVE-2024-21604", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21604" }, { "name": "CVE-2023-32360", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32360" }, { "name": "CVE-2022-0934", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0934" }, { "name": "CVE-2020-9493", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9493" }, { "name": "CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "name": "CVE-2022-2196", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2196" }, { "name": "CVE-2021-39275", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275" }, { "name": "CVE-2022-42896", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42896" }, { "name": "CVE-2022-21699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21699" }, { "name": "CVE-2024-21600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21600" }, { "name": "CVE-2021-33655", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33655" }, { "name": "CVE-2023-0767", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767" }, { "name": "CVE-2022-1462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1462" }, { "name": "CVE-2023-23920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23920" }, { "name": "CVE-2023-20593", "url": "https://www.cve.org/CVERecord?id=CVE-2023-20593" }, { "name": "CVE-2024-21606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21606" }, { "name": "CVE-2022-0330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0330" }, { "name": "CVE-2022-41222", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41222" }, { "name": "CVE-2016-10009", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10009" }, { "name": "CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "name": "CVE-2022-2663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663" }, { "name": "CVE-2023-23918", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23918" }, { "name": "CVE-2024-21591", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21591" }, { "name": "CVE-2020-12321", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12321" }, { "name": "CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "name": "CVE-2022-3524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524" }, { "name": "CVE-2022-39188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188" }, { "name": "CVE-2023-3341", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3341" }, { "name": "CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "name": "CVE-2022-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795" }, { "name": "CVE-2022-22942", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942" }, { "name": "CVE-2022-43945", "url": "https://www.cve.org/CVERecord?id=CVE-2022-43945" }, { "name": "CVE-2022-3625", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3625" }, { "name": "CVE-2021-34798", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798" }, { "name": "CVE-2024-21587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21587" }, { "name": "CVE-2022-42721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42721" }, { "name": "CVE-2022-4378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4378" }, { "name": "CVE-2022-4254", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4254" }, { "name": "CVE-2024-21617", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21617" }, { "name": "CVE-2023-1195", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1195" }, { "name": "CVE-2024-21589", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21589" }, { "name": "CVE-2023-21937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21937" }, { "name": "CVE-2023-22809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22809" }, { "name": "CVE-2022-20141", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20141" }, { "name": "CVE-2021-4155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4155" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2024-21595", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21595" }, { "name": "CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "name": "CVE-2021-3621", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3621" }, { "name": "CVE-2023-0394", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0394" }, { "name": "CVE-2022-22164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22164" }, { "name": "CVE-2024-21597", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21597" }, { "name": "CVE-2021-3752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3752" }, { "name": "CVE-2023-0386", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0386" }, { "name": "CVE-2016-2183", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183" }, { "name": "CVE-2021-26341", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26341" }, { "name": "CVE-2022-38023", "url": "https://www.cve.org/CVERecord?id=CVE-2022-38023" }, { "name": "CVE-2023-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22045" }, { "name": "CVE-2022-1679", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1679" }, { "name": "CVE-2023-22049", "url": "https://www.cve.org/CVERecord?id=CVE-2023-22049" }, { "name": "CVE-2023-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408" }, { "name": "CVE-2022-3619", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3619" }, { "name": "CVE-2021-0920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "name": "CVE-2023-1829", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1829" }, { "name": "CVE-2022-25265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25265" }, { "name": "CVE-2022-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1789" }, { "name": "CVE-2022-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2873" }, { "name": "CVE-2022-3623", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623" }, { "name": "CVE-2024-21611", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21611" }, { "name": "CVE-2024-21613", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21613" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2023-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21968" }, { "name": "CVE-2024-21612", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21612" }, { "name": "CVE-2022-42722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42722" }, { "name": "CVE-2024-21603", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21603" }, { "name": "CVE-2023-21930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21930" }, { "name": "CVE-2024-21585", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21585" }, { "name": "CVE-2022-23302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23302" }, { "name": "CVE-2023-24329", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329" }, { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2021-44790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44790" }, { "name": "CVE-2023-36842", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36842" }, { "name": "CVE-2022-4139", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4139" }, { "name": "CVE-2024-21594", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21594" }, { "name": "CVE-2022-3028", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3028" }, { "name": "CVE-2022-3566", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3566" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2023-21967", "url": "https://www.cve.org/CVERecord?id=CVE-2023-21967" }, { "name": "CVE-2022-41674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41674" }, { "name": "CVE-2024-21601", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21601" }, { "name": "CVE-2023-2124", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124" }, { "name": "CVE-2020-0465", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0465" } ], "initial_release_date": "2024-01-11T00:00:00", "last_revision_date": "2024-01-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0027", "revisions": [ { "description": "Version initiale", "revision_date": "2024-01-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75723 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75741 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75752 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75757 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75730 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75734 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75737 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75721 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75736 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-CTPView-Multiple-vulnerabilities-in-CTPView-CVE-yyyy-nnnn" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75747 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75758 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Junos-OS-Evolved-Telnet-service-may-be-enabled-when-it-is-expected-to-be-disabled-CVE-2022-22164" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75727 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Paragon-Active-Assurance-Control-Center-Information-disclosure-vulnerability-CVE-2024-21589" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75233 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75754 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75753 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75742 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75740 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75748 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75744 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75743 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75738 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75733 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75725 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75755 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75735 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75745 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA75729 du 10 janvier 2024", "url": "https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.