First published: Wed Jan 19 2022(Updated: )
An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Os Evolved | =20.4 | |
Juniper Junos Os Evolved | =20.4-r1 | |
Juniper Junos Os Evolved | =20.4-r1-s1 | |
Juniper Junos Os Evolved | =20.4-r1-s2 | |
Juniper Junos Os Evolved | =20.4-r2 | |
Juniper Junos Os Evolved | =20.4-r2-s1 | |
Juniper Junos Os Evolved | =20.4-r2-s2 | |
Juniper Junos Os Evolved | =20.4-r2-s3 | |
Juniper Junos Os Evolved | =20.4-r3-s1 | |
Juniper Junos Os Evolved | =21.1 | |
Juniper Junos Os Evolved | =21.2 |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R2-S2-EVO, 21.2R2-EVO, 21.3R1-EVO and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-22164.
The title of this vulnerability is 'An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled.'
The affected software is Juniper Networks Junos OS Evolved version 20.4 and later.
The severity rating of this vulnerability is medium with a CVSS score of 5.3.
To fix this vulnerability, you should upgrade Juniper Networks Junos OS Evolved to version 21.2 or apply the necessary patches or updates provided by the vendor.