Junos OS: CLI Certificate Load Stack Overflow (up to 23.4R2)
CVE-2024-39556 Published on July 10, 2024
Junos OS and Junos OS Evolved: Loading a malicious certificate from the CLI may result in a stack-based overflow
A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos OS and Juniper Networks Junos OS Evolved may allow a local, low-privileged attacker with access to the CLI the ability to load a malicious certificate file, leading to a limited Denial of Service (DoS) or privileged code execution.
By exploiting the 'set security certificates' command with a crafted certificate file, a malicious attacker with access to the CLI could cause a crash of the command management daemon (mgd), limited to the local user's command interpreter, or potentially trigger a stack-based buffer overflow.
This issue affects:
Junos OS:
* All versions before 21.4R3-S7,
* from 22.1 before 22.1R3-S6,
* from 22.2 before 22.2R3-S4,
* from 22.3 before 22.3R3-S3,
* from 22.4 before 22.4R3-S2,
* from 23.2 before 23.2R2,
* from 23.4 before 23.4R1-S1, 23.4R2;
Junos OS Evolved:
* All versions before 21.4R3-S7-EVO,
* from 22.1-EVO before 22.1R3-S6-EVO,
* from 22.2-EVO before 22.2R3-S4-EVO,
* from 22.3-EVO before 22.3R3-S3-EVO,
* from 22.4-EVO before 22.4R3-S2-EVO,
* from 23.2-EVO before 23.2R2-EVO,
* from 23.4-EVO before 23.4R1-S1-EVO, 23.4R2-EVO.
Vulnerability Analysis
CVE-2024-39556 is exploitable with local system access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2024-39556 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2024-39556
stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Junos or Juniper Networks Junos Os Evolved. Just hit a watch button to start following.
Affected Versions
Juniper Networks Junos OS:- Before 21.4R3-S7 is affected.
- Version 22.1 and below 22.1R3-S6 is affected.
- Version 22.2 and below 22.2R3-S4 is affected.
- Version 22.3 and below 22.3R3-S3 is affected.
- Version 22.4 and below 22.4R3-S2 is affected.
- Version 23.2 and below 23.2R2 is affected.
- Version 23.4 and below 23.4R1-S1, 23.4R2 is affected.
- Before 21.4R3-S7-EVO is affected.
- Version 22.1-EVO and below 22.1R3-S6-EVO is affected.
- Version 22.2-EVO and below 22.2R3-S4-EVO is affected.
- Version 22.3-EVO and below 22.3R3-S3-EVO is affected.
- Version 22.4-EVO and below 22.4R3-S2-EVO is affected.
- Version 23.2-EVO and below 23.2R2-EVO is affected.
- Version 23.4-EVO and below 23.4R1-S1-EVO, 23.4R2-EVO is affected.
- Before 21.4r3-s7-evo is affected.
- Version 22.1-evo and below 22.1r3-s6-evo is affected.
- Version 22.2-evo and below 22.2r3-s4-evo is affected.
- Version 22.3-evo and below 22.3r3-s3-evo is affected.
- Version 22.4-evo and below 22.4r3-s3-evo is affected.
- Version 23.2-evo and below 23.2r2-evo is affected.
- Before 21.4r3-s7 is affected.
- Version 22.1 and below 22.1r3-s6 is affected.
- Version 22.2 and below 22.2r3-s4 is affected.
- Version 22.3 and below 22.3r3-s3 is affected.
- Version 22.4 and below 22.4r3-s2 is affected.
- Version 23.2 and below 23.2r2 is affected.
- Version 23.4 and below 23.4r1-s1 is affected.
- Version 23.4 and below 23.4r2 is affected.
- Version 23.4-evo and below 23.4r1-s1-evo is affected.
- Version 23.4-evo and below 23.4r2-evo is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.