First published: Thu Apr 14 2022(Updated: )
An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repair operation. Running a repair operation, in turn, will trigger a number of file operations in the %TEMP% folder of the user triggering the repair. Some of these operations will be performed from a SYSTEM context (started via the Windows Installer service), including the execution of temporary files. An attacker may be able to provide malicious binaries to the Windows Installer, which will be executed with high privilege, leading to a local privilege escalation. This issue affects Juniper Networks Juniper Identity Management Service (JIMS) versions prior to 1.4.0.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Identity Management Service | <1.4.0 |
The following software releases have been updated to disable the "repair" function of the Windows installer, resolving this specific issue: JIMS 1.4.0, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22187 has a critical severity rating due to its potential for unprivileged users to trigger repair operations that compromise system integrity.
To fix CVE-2022-22187, upgrade the Juniper Identity Management Service to version 1.4.0 or later.
CVE-2022-22187 affects the Juniper Networks Juniper Identity Management Service versions prior to 1.4.0.
Failing to address CVE-2022-22187 may allow unprivileged users to exploit the vulnerability, potentially leading to unauthorized access and data manipulation.
CVE-2022-22187 impacts system security by allowing unprivileged users to leverage privilege escalation through the Windows Installer framework.