Junos OS Evolved: Missing Auth in SI CF Interface Priv Esc ( v23.2R2-EVO)
CVE-2024-39546 Published on July 11, 2024

Junos OS Evolved: Local low-privilege user can gain root permissions leading to privilege escalation
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.  This issue affects Junos OS Evolved:  * All versions prior to 21.2R3-S8-EVO,  * 21.4 versions prior to  21.4R3-S6-EVO,  * 22.1 versions prior to 22.1R3-S5-EVO,  * 22.2 versions prior to 22.2R3-S3-EVO,  * 22.3 versions prior to 22.3R3-S3-EVO,  * 22.4 versions prior to 22.4R3-EVO,  * 23.2 versions prior to 23.2R2-EVO.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-39546 is exploitable with local system access, requires user interaction and a small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Timeline

Initial Publication

Weakness Type

What is an AuthZ Vulnerability?

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.

CVE-2024-39546 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2024-39546

stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Junos Os Evolved or Juniper Networks Junos Evolved. Just hit a watch button to start following.

 
 

Affected Versions

Juniper Networks Junos OS Evolved:

Exploit Probability

EPSS
0.08%
Percentile
23.75%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.