7.8
Advisory Published
Updated

CVE-2022-22221: Junos OS: SRX and EX Series: Local privilege escalation flaw in "download" functionality

First published: Wed Jul 13 2022(Updated: )

An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the "request ..." or "show system download ..." commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Junos<19.2
Juniper Junos=19.2
Juniper Junos=19.2-r1
Juniper Junos=19.2-r1-s1
Juniper Junos=19.2-r1-s2
Juniper Junos=19.2-r1-s3
Juniper Junos=19.2-r1-s4
Juniper Junos=19.2-r1-s5
Juniper Junos=19.2-r1-s6
Juniper Junos=19.2-r1-s7
Juniper Junos=19.2-r1-s8
Juniper Junos=19.2-r2
Juniper Junos=19.2-r2-s1
Juniper Junos=19.2-r3
Juniper Junos=19.2-r3-s1
Juniper Junos=19.2-r3-s2
Juniper Junos=19.2-r3-s3
Juniper Junos=19.2-r3-s4
Juniper Junos=19.3
Juniper Junos=19.3-r1
Juniper Junos=19.3-r1-s1
Juniper Junos=19.3-r2
Juniper Junos=19.3-r2-s1
Juniper Junos=19.3-r2-s2
Juniper Junos=19.3-r2-s3
Juniper Junos=19.3-r2-s4
Juniper Junos=19.3-r2-s5
Juniper Junos=19.3-r2-s6
Juniper Junos=19.3-r3
Juniper Junos=19.3-r3-s1
Juniper Junos=19.3-r3-s2
Juniper Junos=19.3-r3-s3
Juniper Junos=19.3-r3-s4
Juniper Junos=19.3-r3-s5
Juniper Junos=19.4
Juniper Junos=19.4-r1
Juniper Junos=19.4-r1-s1
Juniper Junos=19.4-r1-s2
Juniper Junos=19.4-r1-s3
Juniper Junos=19.4-r1-s4
Juniper Junos=19.4-r2
Juniper Junos=19.4-r2-s1
Juniper Junos=19.4-r2-s2
Juniper Junos=19.4-r2-s3
Juniper Junos=19.4-r2-s4
Juniper Junos=19.4-r2-s5
Juniper Junos=19.4-r2-s6
Juniper Junos=19.4-r3
Juniper Junos=19.4-r3-s1
Juniper Junos=19.4-r3-s2
Juniper Junos=19.4-r3-s3
Juniper Junos=19.4-r3-s4
Juniper Junos=19.4-r3-s5
Juniper Junos=19.4-r3-s6
Juniper Junos=19.4-r3-s7
Juniper Junos=20.1
Juniper Junos=20.1-r1
Juniper Junos=20.1-r1-s1
Juniper Junos=20.1-r1-s2
Juniper Junos=20.1-r1-s3
Juniper Junos=20.1-r1-s4
Juniper Junos=20.1-r2
Juniper Junos=20.1-r2-s1
Juniper Junos=20.1-r2-s2
Juniper Junos=20.1-r3
Juniper Junos=20.1-r3-s1
Juniper Junos=20.1-r3-s2
Juniper Junos=20.1-r3-s3
Juniper Junos=20.2
Juniper Junos=20.2-r1
Juniper Junos=20.2-r1-s1
Juniper Junos=20.2-r1-s2
Juniper Junos=20.2-r1-s3
Juniper Junos=20.2-r2
Juniper Junos=20.2-r2-s1
Juniper Junos=20.2-r2-s2
Juniper Junos=20.2-r2-s3
Juniper Junos=20.2-r3
Juniper Junos=20.2-r3-s1
Juniper Junos=20.2-r3-s2
Juniper Junos=20.2-r3-s3
Juniper Junos=20.3
Juniper Junos=20.3-r1
Juniper Junos=20.3-r1-s1
Juniper Junos=20.3-r1-s2
Juniper Junos=20.3-r2
Juniper Junos=20.3-r2-s1
Juniper Junos=20.3-r3
Juniper Junos=20.3-r3-s1
Juniper Junos=20.3-r3-s2
Juniper Junos=20.4
Juniper Junos=20.4-r1
Juniper Junos=20.4-r1-s1
Juniper Junos=20.4-r2
Juniper Junos=20.4-r2-s1
Juniper Junos=20.4-r2-s2
Juniper Junos=20.4-r3
Juniper Junos=20.4-r3-s1
Juniper Junos=21.1
Juniper Junos=21.1-r1
Juniper Junos=21.1-r1-s1
Juniper Junos=21.1-r2
Juniper Junos=21.1-r2-s1
Juniper Junos=21.1-r2-s2
Juniper Junos=21.1-r3
Juniper Junos=21.2
Juniper Junos=21.2-r1
Juniper Junos=21.2-r1-s1
Juniper Junos=21.2-r1-s2
Juniper Junos=21.2-r2
Juniper Junos=21.2-r2-s1
Juniper Junos=21.3-r1
Juniper Junos=21.3-r1-s1
Juniper Junos=21.3-r1-s2
Juniper Junos=21.4-r1
Juniper EX Redundant Power System
Juniper EX2200-C
Juniper EX2200
Juniper EX2200
Juniper EX2300-24T
Juniper EX2300-C
Juniper EX2300
Juniper EX3200
Juniper EX3300
Juniper EX3300-VX
Juniper EX3400
Juniper EX Series
Juniper EX4200
Juniper EX4300-24T
Juniper EX4300-24P
Juniper EX4300
Juniper EX4300-24T-S
Juniper EX4300-24T-S
Juniper EX4300-32F-S
Juniper EX4300
Juniper EX4300-32F-S
Juniper EX4300-48MP
Juniper EX4300-48MP-S
Juniper EX4300-48P
Juniper EX4300-48P
Juniper EX4300-48T-AFI
Juniper EX4300-48TAFI
Juniper EX4300-48TDC
Juniper EX4300-48TDC-AFI
Juniper EX4300-48T-S
Juniper EX4300-48TAFI
Juniper EX4300-48T-DC
Juniper EX4300-48T-DC-AFI
Juniper EX4300
Juniper EX4300
Juniper EX4300
Juniper EX4400-24X
juniper ex4500-vc
Juniper EX4500
Juniper EX Series
Juniper EX4550
Juniper EX4550
Juniper EX4600
Juniper EX4600
Juniper EX4650
Juniper EX6200
Juniper EX Series
Juniper EX Series
Juniper EX8200
Juniper EX8208
Juniper EX Series
Juniper EX9200
Juniper EX Series
Juniper EX9208
Juniper EX9214
Juniper EX9250
Juniper EX9251
Juniper EX9253
Juniper SRX100
Juniper SRX110
Juniper SRX1400
Juniper SRX1500
Juniper SRX210
Juniper SRX220
Juniper SRX240
Juniper SRX240H2
Juniper SRX300
Juniper SRX320
Juniper SRX340
Juniper SRX3400
Juniper SRX345
Juniper SRX3600
Juniper SRX380
Juniper SRX4000
Juniper SRX4100
Juniper SRX4200
Juniper SRX4600
Junos OS SRX 5000 Series
Juniper SRX5400
Juniper SRX550
Juniper SRX550
Juniper SRX550
Juniper SRX5600
Juniper SRX5800
Juniper SRX650

Remedy

The following software releases have been updated to resolve this specific issue: 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 20.4R3-S3, 21.1R3-S1, 21.2R2-S2, 21.2R3, 21.3R2, 21.3R3, 21.4R1-S1, 21.4R2, 22.1R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-22221?

    CVE-2022-22221 is rated as a high-severity vulnerability that allows a locally authenticated attacker to gain full control over affected devices.

  • How do I fix CVE-2022-22221?

    To fix CVE-2022-22221, apply the available software updates provided by Juniper Networks for affected Junos OS versions.

  • Which versions of Junos OS are affected by CVE-2022-22221?

    CVE-2022-22221 affects Junos OS versions prior to 19.4 and certain releases within the 19.2, 19.3, 20.1, and 20.2 series.

  • Can CVE-2022-22221 be exploited remotely?

    No, CVE-2022-22221 can only be exploited by a locally authenticated attacker with low privileges.

  • What impact does CVE-2022-22221 have on affected devices?

    CVE-2022-22221 allows attackers to execute arbitrary commands and gain full control of affected devices, potentially compromising their integrity and availability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203