First published: Tue Oct 18 2022(Updated: )
On cSRX Series devices software permission issues in the container filesystem and stored files combined with storing passwords in a recoverable format in Juniper Networks Junos OS allows a local, low-privileged attacker to elevate their permissions to take control of any instance of a cSRX software deployment. This issue affects Juniper Networks Junos OS 20.2 version 20.2R1 and later versions prior to 21.2R1 on cSRX Series.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | >=20.2<21.2 | |
Juniper Csrx |
The following software releases have been updated to resolve this specific issue: Junos OS 21.2R1, and all subsequent releases. Additionally, customers using Docker or Kubernetes must contact JTAC to receive additional guidance on applying commands manually to deployments to provide a complete fix.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-22251.
The title of this vulnerability is 'On cSRX Series devices software permission issues in the container filesystem and stored files combined with storing passwords in a recoverable format'.
The severity of CVE-2022-22251 is high with a severity value of 7.8.
Juniper Networks Junos OS versions 20.2 to 21.2 are affected by CVE-2022-22251.
A local, low-privileged attacker can exploit CVE-2022-22251 to elevate their permissions and take control of any instance of a cSRX software.