cve-2024-47495
Vulnerability from cvelistv5
Published
2024-10-11 15:27
Modified
2024-10-11 17:46
Summary
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This issue affects: Juniper Networks Junos OS Evolved with dual-REs: * All versions before 21.2R3-S8-EVO, * from 21.4-EVO before 21.4R3-S8-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S4-EVO, * from 22.4-EVO before 22.4R3-S3-EVO, * from 23.2-EVO before 23.2R2-S1-EVO, * from 23.4-EVO before 23.4R2-S1-EVO. This issue does not affect Juniper Networks Junos OS.
Impacted products
Vendor Product Version
Juniper Networks Junos OS Evolved Version: 0   
Version: 21.4-EVO   
Version: 22.2-EVO   
Version: 22.3-EVO   
Version: 22.4-EVO   
Version: 23.2-EVO   
Version: 23.4-EVO   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:juniper:junos_evolved:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "junos_evolved",
                  vendor: "juniper",
                  versions: [
                     {
                        lessThan: "21.2r3-s8-evo",
                        status: "affected",
                        version: "0",
                        versionType: "semver",
                     },
                     {
                        lessThan: "21.4r3-s8-evo",
                        status: "affected",
                        version: "21.4",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.2r3-s4-evo",
                        status: "affected",
                        version: "22.2",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.3r3-s4-evo",
                        status: "affected",
                        version: "22.3",
                        versionType: "semver",
                     },
                     {
                        lessThan: "22.4r3-s3-evo",
                        status: "affected",
                        version: "22.4",
                        versionType: "semver",
                     },
                     {
                        lessThan: "23.2r2-s1-evo",
                        status: "affected",
                        version: "23.2",
                        versionType: "semver",
                     },
                     {
                        lessThan: "23.4r2-s1-evo",
                        status: "affected",
                        version: "23.4",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-47495",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-11T17:43:24.369427Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-11T17:46:59.833Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Junos OS Evolved",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "21.2R3-S8-EVO",
                     status: "affected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "21.4R3-S8-EVO",
                     status: "affected",
                     version: "21.4-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.2R3-S4-EVO",
                     status: "affected",
                     version: "22.2-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.3R3-S4-EVO",
                     status: "affected",
                     version: "22.3-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "22.4R3-S3-EVO",
                     status: "affected",
                     version: "22.4-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.2R2-S1-EVO",
                     status: "affected",
                     version: "23.2-EVO",
                     versionType: "semver",
                  },
                  {
                     lessThan: "23.4R2-S1-EVO",
                     status: "affected",
                     version: "23.4-EVO",
                     versionType: "semver",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "To determine if the system is running a dual routing engine verify if the redundancy configuration and the status of routing engines is in use, issue the following command: <br>&nbsp; show chassis routing-engine<br><br>",
                  },
               ],
               value: "To determine if the system is running a dual routing engine verify if the redundancy configuration and the status of routing engines is in use, issue the following command: \n  show chassis routing-engine",
            },
         ],
         datePublic: "2024-10-09T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.<br><br>This issue affects:<br>Juniper Networks Junos OS Evolved with dual-REs:<br><ul><li><span style=\"background-color: var(--wht);\">All versions before 21.2R3-S8-EVO,</span></li><li><span style=\"background-color: var(--wht);\">from 21.4-EVO before 21.4R3-S8-EVO,</span></li><li><span style=\"background-color: var(--wht);\">from 22.2-EVO before 22.2R3-S4-EVO,</span></li><li><span style=\"background-color: var(--wht);\">from 22.3-EVO before 22.3R3-S4-EVO,</span></li><li><span style=\"background-color: var(--wht);\">from 22.4-EVO before 22.4R3-S3-EVO,</span></li><li><span style=\"background-color: var(--wht);\">from 23.2-EVO before 23.2R2-S1-EVO,</span></li><li><span style=\"background-color: var(--wht);\">from 23.4-EVO before 23.4R2-S1-EVO.</span><br></li></ul>This issue does not affect Juniper Networks Junos OS.<br><br>",
                  },
               ],
               value: "An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.\n\nThis issue affects:\nJuniper Networks Junos OS Evolved with dual-REs:\n  *  All versions before 21.2R3-S8-EVO,\n  *  from 21.4-EVO before 21.4R3-S8-EVO,\n  *  from 22.2-EVO before 22.2R3-S4-EVO,\n  *  from 22.3-EVO before 22.3R3-S4-EVO,\n  *  from 22.4-EVO before 22.4R3-S3-EVO,\n  *  from 23.2-EVO before 23.2R2-S1-EVO,\n  *  from 23.4-EVO before 23.4R2-S1-EVO.\n\n\n\nThis issue does not affect Juniper Networks Junos OS.",
            },
         ],
         exploits: [
            {
               lang: "eng",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
                  },
               ],
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
            {
               cvssV4_0: {
                  Automatable: "YES",
                  Recovery: "USER",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "NONE",
                  attackVector: "LOCAL",
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  privilegesRequired: "HIGH",
                  providerUrgency: "GREEN",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "NONE",
                  valueDensity: "CONCENTRATED",
                  vectorString: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:L/U:Green",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "HIGH",
                  vulnIntegrityImpact: "HIGH",
                  vulnerabilityResponseEffort: "LOW",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-639",
                     description: "CWE-639 Authorization Bypass Through User-Controlled Key",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-10-11T15:27:08.344Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://kb.juniper.net/JSA88122",
            },
         ],
         solutions: [
            {
               lang: "eng",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S1-EVO, 23.4R2-S1-EVO, <span style=\"background-color: rgb(244, 244, 244);\">24.2R1-EVO</span>&nbsp;and all subsequent releases.",
                  },
               ],
               value: "The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S1-EVO, 23.4R2-S1-EVO, 24.2R1-EVO and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA88122",
            defect: [
               "1790662",
            ],
            discovery: "INTERNAL",
         },
         title: "Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device.",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "There are no known workarounds for this issue.<br><br>To reduce the risk of exploitation, limit access to the device only from trusted administrative networks, users and hosts.<br><br>",
                  },
               ],
               value: "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation, limit access to the device only from trusted administrative networks, users and hosts.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-47495",
      datePublished: "2024-10-11T15:27:08.344Z",
      dateReserved: "2024-09-25T15:26:52.609Z",
      dateUpdated: "2024-10-11T17:46:59.833Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-47495\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2024-10-11T16:15:09.830\",\"lastModified\":\"2024-10-15T12:58:51.050\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.\\n\\nThis issue affects:\\nJuniper Networks Junos OS Evolved with dual-REs:\\n  *  All versions before 21.2R3-S8-EVO,\\n  *  from 21.4-EVO before 21.4R3-S8-EVO,\\n  *  from 22.2-EVO before 22.2R3-S4-EVO,\\n  *  from 22.3-EVO before 22.3R3-S4-EVO,\\n  *  from 22.4-EVO before 22.4R3-S3-EVO,\\n  *  from 23.2-EVO before 23.2R2-S1-EVO,\\n  *  from 23.4-EVO before 23.4R2-S1-EVO.\\n\\n\\n\\nThis issue does not affect Juniper Networks Junos OS.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de omisión de autorización a través de una clave controlada por el usuario permite que un atacante autenticado localmente con acceso al shell obtenga control total del dispositivo cuando se utilizan motores de enrutamiento dual (RE) en dispositivos Juniper Networks Junos OS Evolved. Este problema afecta a: Juniper Networks Junos OS Evolved con RE duales: * Todas las versiones anteriores a 21.2R3-S8-EVO, * desde 21.4-EVO hasta 21.4R3-S8-EVO, * desde 22.2-EVO hasta 22.2R3-S4-EVO, * desde 22.3-EVO hasta 22.3R3-S4-EVO, * desde 22.4-EVO hasta 22.4R3-S3-EVO, * desde 23.2-EVO hasta 23.2R2-S1-EVO, * desde 23.4-EVO hasta 23.4R2-S1-EVO. Este problema no afecta a Juniper Networks Junos OS.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Green\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"HIGH\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"YES\",\"recovery\":\"USER\",\"valueDensity\":\"CONCENTRATED\",\"vulnerabilityResponseEffort\":\"LOW\",\"providerUrgency\":\"GREEN\"}}],\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-639\"}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA88122\",\"source\":\"sirt@juniper.net\"}]}}",
      vulnrichment: {
         containers: "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"Junos OS Evolved\", \"vendor\": \"Juniper Networks\", \"versions\": [{\"lessThan\": \"21.2R3-S8-EVO\", \"status\": \"affected\", \"version\": \"0\", \"versionType\": \"semver\"}, {\"lessThan\": \"21.4R3-S8-EVO\", \"status\": \"affected\", \"version\": \"21.4-EVO\", \"versionType\": \"semver\"}, {\"lessThan\": \"22.2R3-S4-EVO\", \"status\": \"affected\", \"version\": \"22.2-EVO\", \"versionType\": \"semver\"}, {\"lessThan\": \"22.3R3-S4-EVO\", \"status\": \"affected\", \"version\": \"22.3-EVO\", \"versionType\": \"semver\"}, {\"lessThan\": \"22.4R3-S3-EVO\", \"status\": \"affected\", \"version\": \"22.4-EVO\", \"versionType\": \"semver\"}, {\"lessThan\": \"23.2R2-S1-EVO\", \"status\": \"affected\", \"version\": \"23.2-EVO\", \"versionType\": \"semver\"}, {\"lessThan\": \"23.4R2-S1-EVO\", \"status\": \"affected\", \"version\": \"23.4-EVO\", \"versionType\": \"semver\"}]}], \"configurations\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"To determine if the system is running a dual routing engine verify if the redundancy configuration and the status of routing engines is in use, issue the following command: <br>&nbsp; show chassis routing-engine<br><br>\"}], \"value\": \"To determine if the system is running a dual routing engine verify if the redundancy configuration and the status of routing engines is in use, issue the following command: \\n\\u00a0 show chassis routing-engine\"}], \"datePublic\": \"2024-10-09T16:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.<br><br>This issue affects:<br>Juniper Networks Junos OS Evolved with dual-REs:<br><ul><li><span style=\\\"background-color: var(--wht);\\\">All versions before 21.2R3-S8-EVO,</span></li><li><span style=\\\"background-color: var(--wht);\\\">from 21.4-EVO before 21.4R3-S8-EVO,</span></li><li><span style=\\\"background-color: var(--wht);\\\">from 22.2-EVO before 22.2R3-S4-EVO,</span></li><li><span style=\\\"background-color: var(--wht);\\\">from 22.3-EVO before 22.3R3-S4-EVO,</span></li><li><span style=\\\"background-color: var(--wht);\\\">from 22.4-EVO before 22.4R3-S3-EVO,</span></li><li><span style=\\\"background-color: var(--wht);\\\">from 23.2-EVO before 23.2R2-S1-EVO,</span></li><li><span style=\\\"background-color: var(--wht);\\\">from 23.4-EVO before 23.4R2-S1-EVO.</span><br></li></ul>This issue does not affect Juniper Networks Junos OS.<br><br>\"}], \"value\": \"An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices.\\n\\nThis issue affects:\\nJuniper Networks Junos OS Evolved with dual-REs:\\n  *  All versions before 21.2R3-S8-EVO,\\n  *  from 21.4-EVO before 21.4R3-S8-EVO,\\n  *  from 22.2-EVO before 22.2R3-S4-EVO,\\n  *  from 22.3-EVO before 22.3R3-S4-EVO,\\n  *  from 22.4-EVO before 22.4R3-S3-EVO,\\n  *  from 23.2-EVO before 23.2R2-S1-EVO,\\n  *  from 23.4-EVO before 23.4R2-S1-EVO.\\n\\n\\n\\nThis issue does not affect Juniper Networks Junos OS.\"}], \"exploits\": [{\"lang\": \"eng\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\"}], \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"LOCAL\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"cvssV4_0\": {\"Automatable\": \"YES\", \"Recovery\": \"USER\", \"Safety\": \"NOT_DEFINED\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"attackVector\": \"LOCAL\", \"baseScore\": 8.4, \"baseSeverity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"providerUrgency\": \"GREEN\", \"subAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"valueDensity\": \"CONCENTRATED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:L/U:Green\", \"version\": \"4.0\", \"vulnAvailabilityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"LOW\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-639\", \"description\": \"CWE-639 Authorization Bypass Through User-Controlled Key\", \"lang\": \"eng\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2024-10-11T15:27:08.344Z\"}, \"references\": [{\"tags\": [\"vendor-advisory\"], \"url\": \"https://kb.juniper.net/JSA88122\"}], \"solutions\": [{\"lang\": \"eng\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S1-EVO, 23.4R2-S1-EVO, <span style=\\\"background-color: rgb(244, 244, 244);\\\">24.2R1-EVO</span>&nbsp;and all subsequent releases.\"}], \"value\": \"The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S1-EVO, 23.4R2-S1-EVO, 24.2R1-EVO\\u00a0and all subsequent releases.\"}], \"source\": {\"advisory\": \"JSA88122\", \"defect\": [\"1790662\"], \"discovery\": \"INTERNAL\"}, \"title\": \"Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device.\", \"workarounds\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"There are no known workarounds for this issue.<br><br>To reduce the risk of exploitation, limit access to the device only from trusted administrative networks, users and hosts.<br><br>\"}], \"value\": \"There are no known workarounds for this issue.\\n\\nTo reduce the risk of exploitation, limit access to the device only from trusted administrative networks, users and hosts.\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47495\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-11T17:43:24.369427Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:juniper:junos_evolved:*:*:*:*:*:*:*:*\"], \"vendor\": \"juniper\", \"product\": \"junos_evolved\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"21.2r3-s8-evo\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"21.4\", \"lessThan\": \"21.4r3-s8-evo\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.2\", \"lessThan\": \"22.2r3-s4-evo\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3\", \"lessThan\": \"22.3r3-s4-evo\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4r3-s3-evo\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2\", \"lessThan\": \"23.2r2-s1-evo\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.4\", \"lessThan\": \"23.4r2-s1-evo\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-11T17:46:47.629Z\"}}]}",
         cveMetadata: "{\"cveId\": \"CVE-2024-47495\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"juniper\", \"dateReserved\": \"2024-09-25T15:26:52.609Z\", \"datePublished\": \"2024-10-11T15:27:08.344Z\", \"dateUpdated\": \"2024-10-11T17:46:59.833Z\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.