First published: Fri Mar 14 2014(Updated: )
Unspecified vulnerability in the Linux Network Connect client in Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS before 7.1r18, 7.3 before 7.3r10, 7.4 before 7.4r8, and 8.0 before 8.0r1 allows local users to gain privileges via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Ive Os | =7.1 | |
Juniper Ive Os | =7.3 | |
Juniper Ive Os | =7.4 | |
Juniper Ive Os | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2292 has been classified with a severity that indicates local user privilege escalation risks in affected versions.
To fix CVE-2014-2292, update to Junos Pulse Secure Access Service versions 7.1r18, 7.3r10, 7.4r8, or 8.0r1 and later.
CVE-2014-2292 affects Juniper IVE OS versions prior to 7.1r18, 7.3r10, 7.4r8, and 8.0r1.
Yes, local users can exploit CVE-2014-2292 to gain elevated privileges on the affected systems.
Yes, Juniper has released patches for CVE-2014-2292 in the specified updated versions.